Tuesday, January 28, 2025
HomeMalwareMobile apps of seven larger banks in India affected with Malware -...

Mobile apps of seven larger banks in India affected with Malware – Still not yet fixed

Published on

SIEM as a Service

Follow Us on Google News

[jpshare]Mobile apps of seven large banks in India infected with Malware that capable of stealing financial information, revealed by US-based digital security firm FireEye.

In India, we have seen monetarily prompt cyber-criminal groups propelling sophisticated attacks to steal funds from many potential sources: organizations, buyers, ATMs and banks.

“As India’s digital payment systems handle more transactions, they will become more lucrative targets,” Vishal Raman, India Head at FireEye told BusinessLine.

As per US-based digital security firm FireEye, banking network frauds have spread all over the world. The firm has followed such events that influenced banks in Ukraine, Ecuador and India, with misfortunes totaling more than $100 million.

“We have found mobile apps of seven large banks in India infected with malware that has the capability to steal user credentials. We have informed the banks about the same,” Raman said, without disclosing the names of the banks to prevent misuse of the vulnerabilities.

Sophisticated Malware’s

Financial attackers have improved their tactics, techniques, and procedures to the point where they have become difficult to detect and challenging to investigate and remediate,” he said.

FireEye finds’s two Sophisticated malwares with Indian Banking apps.

  1. Webinjects.
  2. Bugat.

Webinjects

Webinjects are utilized by banking trojans to alter the contents of a web page that user sees on a compromised device. The trojan can inject code, for example, JavaScript into the program to cooperate with the site content and perform different activities.

Bugat

Bugat Trojan communicates with a command and control server from where it gets directions and updates to the list of financial related sites it targets. This correspondence can be encoded keeping in mind the end goal to bypass traffic examination tools.

Bugat accompanies abilities ordinarily found in malware used to perform credential theft OR financial fraud.

“Based on our analysis of Bugat configuration files observed in August 2015, targets exclusively related to financial services used by consumers, corporations, and financial services were added during this time, continuing the operators’ focus on this sector,” Raman said to Business Line.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

TorNet Backdoor Exploits Windows Scheduled Tasks to Deploy Malware

Cisco Talos researchers have identified an ongoing cyber campaign, active since mid-2024, deploying a...

Hackers Could Bypassing EDR Using Windows Symbolic Links to Disable Service Executables

A groundbreaking technique for exploiting Windows systems has emerged, combining the "Bring Your Own...

Microsoft Unveils Phishing Attack Protection for Teams Chat

Microsoft has taken a significant step toward enhancing cybersecurity by introducing a new phishing...

Apple Security Update – Patch for iOS Zero-day, MacOS & More

Apple has responded to a newly discovered zero-day vulnerability affecting its operating systems by...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

TorNet Backdoor Exploits Windows Scheduled Tasks to Deploy Malware

Cisco Talos researchers have identified an ongoing cyber campaign, active since mid-2024, deploying a...

New Hacker Group Using 7z & UltraVNC Tool to Deploy Malware Evading Detection

A sophisticated cyber campaign targeting Russian-speaking entities has been identified by cybersecurity researchers, unveiling...

Weaponised XWorm RAT Builder Attacking Script Kiddies To Hack 18,000 Devices

A recent cybersecurity attack involving a Trojanized version of the XWorm Remote Access Trojan...