Thursday, February 20, 2025
HomeAndroidNew Android Banking Malware Recording Screen, Keylogging & Spy Android Users...

New Android Banking Malware Recording Screen, Keylogging & Spy Android Users Via VNC

Published on

SIEM as a Service

Follow Us on Google News

Oscorp, a new Android malware stealing funds from the victims’ home banking service, by combining the usage of phishing kits and vishing calls. This new version of Oscorp malware was detected by Cleafy systems.

According to the report, the geographical distribution of banks and other apps targeted by Oscorp includes Spain, Poland, Germany, Turkey, the U.S., Italy, Japan, Australia, France, and India.

Main Features of Oscorp Malware

  • Ability to send/intercept/delete SMS and make phone calls
  • Ability to perform Overlay Attacks for more than 150 mobile applications
  • VNC feature through WebRTC protocol and Android Accessibility Services
  • Enabling key logging functionalities

Experts say once the malware is installed in the victim’s device, it enables Threat Actors to remotely connect to it via WebRTC protocol.

It is observed that threat actors leveraging on fake bank operators to convince victims over the phone while performing unauthorized bank transfers in the background. Also, these phishing campaigns were distributed via SMS messages (smishing), a common approach for retrieving valid credentials and phone numbers.

Android Banking Malware
Working of Oscorp Malware

This new malware abuses the Android Accessibility services, a well-known technique used by the other families as well (e.g. Anubis, Cerberus/Alien, TeaBot, etc..).

It is being observed that on multiple hacking forums, a new Android botnet known as UBEL started being promoted. Multiple UBEL clients started accusing of scamming, as it appeared not to work on some specific Android devices.

The main link between Oscorp and UBEL, is the “bot id” string format, which consists of an initial “RZ-” substring followed by some random alphanumeric characters.

Once the malware is downloaded on the device, the malware attempts to install itself as a service and hide its presence from the target, thereby achieving persistence for extended periods.

Android Banking Malware
Screenshots during the installation phase of Oscorp

Screenshots during the installation phase of OscorpTherefore, “The malware is distributed by the threat actors for gaining full remote access to the infected mobile device and performing unauthorized bank transfers from the infected device itself, drastically reducing their footprint since a new device enrollment is not required in this scenario”, state the experts from Cleafy systems.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

PoC Exploit Released for Ivanti EPM Vulnerabilities

A recent investigation into Ivanti Endpoint Manager (EPM) has uncovered four critical vulnerabilities that...

Ransomware Trends 2025 – What’s new

As of February 2025, ransomware remains a formidable cyber threat, evolving in complexity and...

Hackers Delivering Malware Bundled with Fake Job Interview Challenges

ESET researchers have uncovered a series of malicious activities orchestrated by a North Korea-aligned...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

PoC Exploit Released for Ivanti EPM Vulnerabilities

A recent investigation into Ivanti Endpoint Manager (EPM) has uncovered four critical vulnerabilities that...

Ransomware Trends 2025 – What’s new

As of February 2025, ransomware remains a formidable cyber threat, evolving in complexity and...