Friday, April 25, 2025
HomeCyber AttackNew Banking Attacking Users of Indian banks to Steal Aadhar, PAN, ATM...

New Banking Attacking Users of Indian banks to Steal Aadhar, PAN, ATM & Credit Card PINs

Published on

SIEM as a Service

Follow Us on Google News

A sophisticated malware campaign, dubbed “FatBoyPanel,” has been uncovered by cybersecurity researchers, targeting users of Indian banks.

This campaign, consisting of nearly 900 malware samples, is designed to steal sensitive financial and personal information, including Aadhaar numbers, PAN cards, ATM PINs, and credit card details.

The malware primarily exploits Android devices and poses a significant threat to digital banking security in India.

- Advertisement - Google News

How the Malware Operates

The malware is distributed via WhatsApp as APK files that masquerade as legitimate government or banking applications.

Once installed, these malicious apps mimic the user interface of real banking apps to deceive users into providing sensitive information.

Key details targeted include Aadhaar and PAN numbers, credit and debit card credentials, ATM PINs, and mobile banking login details.

Indian banks
The Phishing UI displayed with the app to steal Sensitive Information

One of the malware’s most alarming features is its ability to exploit SMS permissions on compromised devices.

It intercepts and exfiltrates one-time passwords (OTPs) and other sensitive messages, enabling unauthorized transactions.

The malware employs advanced stealth techniques to hide its presence and resist uninstallation, ensuring persistence on infected devices.

Variants and Data Exposure

The FatBoyPanel malware family includes three distinct variants:

  1. SMS Forwarding: Captures SMS messages and forwards them to attacker-controlled phone numbers.
  2. Firebase Exfiltration: Sends stolen SMS data to Firebase endpoints acting as command-and-control (C&C) servers.
  3. Hybrid: Combines both methods for data exfiltration.

Researchers identified over 1,000 malicious applications linked to this campaign.

These apps use techniques like code obfuscation to evade detection and make reverse engineering challenging.

Alarmingly, data exfiltrated through Firebase endpoints was found to be publicly accessible due to a lack of authentication mechanisms.

This exposed sensitive information of approximately 50,000 users, including bank account details and government-issued IDs.

Indian banks
Distribution of Indian Bank & Schemes used in the phishing campaign

Zimperium analysis of the attackers’ phone numbers revealed that most were registered in regions such as West Bengal, Bihar, and Jharkhand.

The campaign also impersonated several prominent Indian banks by replicating their app icons and interfaces to enhance credibility.

To mitigate risks:

  • Users should download banking apps only from official app stores.
  • Multi-factor authentication (MFA), such as biometric verification or OTPs, should be enabled for added security.
  • Avoid clicking on suspicious links or installing APK files from unknown sources.

The increasing reliance on digital payments in India underscores the importance of robust cybersecurity measures.

Both individuals and institutions must remain vigilant against evolving threats like the FatBoyPanel campaign to safeguard financial data effectively.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Microsoft Defender XDR False Positive Leaked Massive 1,700+ Sensitive Documents to Publish

An alarming data leak involving Microsoft Defender XDR has exposed more than 1,700 sensitive...

‘SessionShark’ – A New Toolkit Bypasses Microsoft Office 365 MFA Security

Security researchers have uncovered a new and sophisticated threat to Microsoft Office 365 users:...

Hackers Exploit MS-SQL Servers to Deploy Ammyy Admin for Remote Access

A sophisticated cyberattack campaign has surfaced, targeting poorly managed Microsoft SQL (MS-SQL) servers to...

New Report Reveals How AI is Rapidly Enhancing Phishing Attack Precision

The Zscaler ThreatLabz 2025 Phishing Report unveils the alarming sophistication of modern phishing attacks,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Microsoft Defender XDR False Positive Leaked Massive 1,700+ Sensitive Documents to Publish

An alarming data leak involving Microsoft Defender XDR has exposed more than 1,700 sensitive...

‘SessionShark’ – A New Toolkit Bypasses Microsoft Office 365 MFA Security

Security researchers have uncovered a new and sophisticated threat to Microsoft Office 365 users:...

Hackers Exploit MS-SQL Servers to Deploy Ammyy Admin for Remote Access

A sophisticated cyberattack campaign has surfaced, targeting poorly managed Microsoft SQL (MS-SQL) servers to...