Thursday, March 28, 2024

New Android Banking Malware Recording Screen, Keylogging & Spy Android Users Via VNC

Oscorp, a new Android malware stealing funds from the victims’ home banking service, by combining the usage of phishing kits and vishing calls. This new version of Oscorp malware was detected by Cleafy systems.

According to the report, the geographical distribution of banks and other apps targeted by Oscorp includes Spain, Poland, Germany, Turkey, the U.S., Italy, Japan, Australia, France, and India.

Main Features of Oscorp Malware

  • Ability to send/intercept/delete SMS and make phone calls
  • Ability to perform Overlay Attacks for more than 150 mobile applications
  • VNC feature through WebRTC protocol and Android Accessibility Services
  • Enabling key logging functionalities

Experts say once the malware is installed in the victim’s device, it enables Threat Actors to remotely connect to it via WebRTC protocol.

It is observed that threat actors leveraging on fake bank operators to convince victims over the phone while performing unauthorized bank transfers in the background. Also, these phishing campaigns were distributed via SMS messages (smishing), a common approach for retrieving valid credentials and phone numbers.

Android Banking Malware
Working of Oscorp Malware

This new malware abuses the Android Accessibility services, a well-known technique used by the other families as well (e.g. Anubis, Cerberus/Alien, TeaBot, etc..).

It is being observed that on multiple hacking forums, a new Android botnet known as UBEL started being promoted. Multiple UBEL clients started accusing of scamming, as it appeared not to work on some specific Android devices.

The main link between Oscorp and UBEL, is the “bot id” string format, which consists of an initial “RZ-” substring followed by some random alphanumeric characters.

Once the malware is downloaded on the device, the malware attempts to install itself as a service and hide its presence from the target, thereby achieving persistence for extended periods.

Android Banking Malware
Screenshots during the installation phase of Oscorp

Screenshots during the installation phase of OscorpTherefore, “The malware is distributed by the threat actors for gaining full remote access to the infected mobile device and performing unauthorized bank transfers from the infected device itself, drastically reducing their footprint since a new device enrollment is not required in this scenario”, state the experts from Cleafy systems.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles