Saturday, November 16, 2024
HomeAndroidMalware Spotted on the Google Play Store Steals Banking Credentials & Intercepts...

Malware Spotted on the Google Play Store Steals Banking Credentials & Intercepts SMS Messages

Published on

The Zscaler ThreatLabz team found the ‘Xenomorph’ banking trojan embedded in a Lifestyle app in the Google Play store.

The app’s name is “Todo: Day Manager,” and has more than 1,000 downloads. 

The trojan called ‘Xenomorph’ steals login information from users’ devices’ banking applications.

- Advertisement - SIEM as a Service

Additionally, it has the ability to intercept users’ SMS messages and notifications, enabling it access to one-time passwords and requests for multifactor authentication.

“Our analysis found that the Xenomorph banking malware is dropped from GitHub as a fake Google Service application upon installation of the app”, the Zscaler ThreatLabz team

“It starts with asking users to enable access permission. Once provided, it adds itself as a device admin and prevents users from disabling Device Admin, making it uninstallable from the phone”.

Xenomorph Infection Cycle

The application obtains the banking malware payload URL when it is first launched by connecting to a Firebase server

The malicious Xenomorph banking malware samples are then downloaded from Github.

Later, to seek more commands and spread the infection, this financial malware contacts the command-and-control (C2) servers using Telegram page content or a static code routine.

Xenomorph Infection Cycle

Researchers say the malware will only download further banking payloads if the “Enabled” parameter is set to true. Also, the banking payload has the Telegram page link encoded with RC4 encryption. 

Upon execution, the banking payload will reach out to the Telegram page and download the content hosted on that page.

It’s been noticed that C2 domains are encoded in RC4 and stored within the code. The payload notifies C2 about every loaded application so that it can get further instructions.

In one instance, if a legitimate application is installed in the infected device, it will display the fake login page of a targeted banking application.

Malware uploading all package information to receive commands

Another program called “Expense Keeper” was also seen by ThreatLabz to be acting in a similar manner. When this application is executed, it is seen that the “Enabled parameter” is set to false. 

The Dropper URL for the banking payload could not be retrieved. For the same, ThreatLabz collaborates with the Google Security team.

Final Word

These bank phishing installers frequently rely on deceiving users into installing harmful programs.

Users are urged to pay attention to the applications that are installed. A Play Store app shouldn’t urge users to install it from untrusted sources or side-load it. Finally, user awareness is crucial to thwarting various phishing tactics.

Managed DDoS Attack Protection for Applications – Download Free Guide

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Google Unveils New Intelligent, Real-Time Protections for Android Users

Google has once again raised the bar for mobile security by introducing two new...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

ToxicPanda Banking Malware Attacking Banking Users To Steal Logins

Recent research has uncovered a new strain of malware developed for Android devices, initially...