Wednesday, March 26, 2025
HomeMalwareMany New Apps Injected with Banking Malware found in Google Play Store

Many New Apps Injected with Banking Malware found in Google Play Store

Published on

SIEM as a Service

Follow Us on Google News

[jpshare]Security researcher Niels Croese found much new banking malware on Google Play, which has numerous new banking application focuses in its configurations.

Taking a look at the names of the exercises and other manifest items it appeared like an ordinary application with embedded malware.

Apparently, the app was updated recently (April 8, 2017) and this was most likely when the malware was added. I reported the app through their reporting system but at the time of writing it is still available on Google Play. Researcher told.

He found the sample application Funny Videos 2017 with Bankpot rules tagged with DexProtector(secure your Android applications and Android libraries (AARs) against unauthorized or illegal use).

Nowadays with social Engineering techniques, Fraudsters used to make people believe it is from trusted source and to steal their credentials.

New apps Injected with Banking malware found in Google Play Store

As should be obvious it appears to have 1k to 5k introduces, which isn’t much for a typical application, however a considerable amount of malware.

Malware App Targets

Since the DexProtector obfuscated APK takes more time to deobfuscate and most malware doesn’t update rapidly.

Later they chose to get a current BankBot test that wasn’t jumbled this intensely to get the deobfuscation schedule.They cleaned up the deobfuscation routine from the sample a bit and ended up with the source code.

By looking at the source Java code and running the program bringing about the deobfuscated information containing a rundown of all applications that are focussed.

The list consist of more banks than they expected contained some new Dutch targets including ABN, Rabobank, ASN, Regiobank, and Binck. A full list can be found on authors page.

Common Defences

  • Maintain the CIA cycle.
  • Don’t install the app from Untrusted source.
  • While installing careful check for App permissions.
  • Do have a Mobile security App.

Also Read

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Use “Atlantis AIO” Tool to Automate Credential Stuffing Attacks

In a concerning development for cybersecurity professionals, threat actors are increasingly utilizing a powerful...

Hackers Exploit COM Objects for Fileless Malware and Lateral Movement

Security researchers Dylan Tran and Jimmy Bayne have unveiled a new fileless lateral movement...

B1ack’s Stash Marketplace Actors Set to Release 4 Million Stolen Credit Card Records for Free

In a significant escalation of illicit activities, B1ack’s Stash, a notorious dark web carding...

Pakistan APT Hackers Weaponize malicious IndiaPost Site to Target Windows and Android Users

A Pakistan-based Advanced Persistent Threat (APT) group, likely APT36, has launched a multi-platform cyberattack...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Exploit COM Objects for Fileless Malware and Lateral Movement

Security researchers Dylan Tran and Jimmy Bayne have unveiled a new fileless lateral movement...

New IOCONTROL Malware Let Attackers Control Critical Infrastructure & Gain Remote Access

A new malware strain called IOCONTROL has emerged, posing a significant threat to Internet...

YouTube Creators Targeted by Weaponized Brand Deals Using ‘Clickflix’ Attack Tactic

A new wave of cyberattacks is targeting YouTube creators, leveraging fake brand collaboration offers...