An Android malware campaign was previously discovered that distributed banking trojans targeting four major Iranian Banks: Bank Mellat, Bank Saderat, Resalat Bank, and Central Bank of Iran.
There were 40 credential-harvesting applications circulated on Cafe Bazaar between December 2022 and May 2023.
These applications mimicked the legitimate versions of the banking applications for stealing login credentials, credit card information, and SMS OTP codes.
However, recent research found that there were 245 of these applications which were not reported during the previous research.
28 out of these 245 applications were able to evade VirusTotal scanning. The samples of these applications were linked with the same threat actors.
StorageGuard scans, detects, and fixes security misconfigurations and vulnerabilities across hundreds of storage and backup devices.
The new applications were found with several new capabilities, like checking the presence of other applications, and seemed to have expanded their targets to new banks.
Nevertheless, the applications are still under development by the malware developers as these new capabilities tend to expand their attack.
In addition to this, the applications also collected information about several cryptocurrency wallet applications. There are high possibilities that crypto wallets could be their future target.
Furthermore, these applications were also found to be utilizing accessibility services for overlaying screens intended to harvest login credentials and credit card details.
They also abused other accessibility services such as Auto Grant of SMS permissions, preventions of uninstallation, and search & click of UI elements.
As part of exfiltrating the data, some of the C2 servers were found to be consisting of a PHP source that had Telegram channel IDs and bot tokens. The threat actors also used GitHub to share the final C&C URL.
Furthermore, a complete report about these malware and variants has been published, which provides detailed information about the attack vectors, their source code, indicators of compromise, and other information.
Experience how StorageGuard eliminates the security blind spots in your storage systems by trying a 14-day free trial.
A new project has exposed a critical attack vector that exploits protocol vulnerabilities to disrupt…
A threat actor known as #LongNight has reportedly put up for sale remote code execution…
Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager Mobile…
Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular application…
The European Union has escalated its response to Russia’s ongoing campaign of hybrid threats, announcing…
Venice.ai has rapidly emerged as a disruptive force in the AI landscape, positioning itself as…