Uncategorized

New Android Banking Malware Recording Screen, Keylogging & Spy Android Users Via VNC

Oscorp, a new Android malware stealing funds from the victims’ home banking service, by combining the usage of phishing kits and vishing calls. This new version of Oscorp malware was detected by Cleafy systems.

According to the report, the geographical distribution of banks and other apps targeted by Oscorp includes Spain, Poland, Germany, Turkey, the U.S., Italy, Japan, Australia, France, and India.

Main Features of Oscorp Malware

  • Ability to send/intercept/delete SMS and make phone calls
  • Ability to perform Overlay Attacks for more than 150 mobile applications
  • VNC feature through WebRTC protocol and Android Accessibility Services
  • Enabling key logging functionalities

Experts say once the malware is installed in the victim’s device, it enables Threat Actors to remotely connect to it via WebRTC protocol.

It is observed that threat actors leveraging on fake bank operators to convince victims over the phone while performing unauthorized bank transfers in the background. Also, these phishing campaigns were distributed via SMS messages (smishing), a common approach for retrieving valid credentials and phone numbers.

Working of Oscorp Malware

This new malware abuses the Android Accessibility services, a well-known technique used by the other families as well (e.g. Anubis, Cerberus/Alien, TeaBot, etc..).

It is being observed that on multiple hacking forums, a new Android botnet known as UBEL started being promoted. Multiple UBEL clients started accusing of scamming, as it appeared not to work on some specific Android devices.

The main link between Oscorp and UBEL, is the “bot id” string format, which consists of an initial “RZ-” substring followed by some random alphanumeric characters.

Once the malware is downloaded on the device, the malware attempts to install itself as a service and hide its presence from the target, thereby achieving persistence for extended periods.

Screenshots during the installation phase of Oscorp

Screenshots during the installation phase of OscorpTherefore, “The malware is distributed by the threat actors for gaining full remote access to the infected mobile device and performing unauthorized bank transfers from the infected device itself, drastically reducing their footprint since a new device enrollment is not required in this scenario”, state the experts from Cleafy systems.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver Fox,…

8 hours ago

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group has…

8 hours ago

LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager

The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its initial…

8 hours ago

Threat Actors Using Ephemeral Port 60102 for Covert Malware Communications

Recent cybersecurity investigations have uncovered a sophisticated technique employed by threat actors to evade detection…

8 hours ago

App with Over 100,000 Downloads from Google Play Steals User Data and Blackmails

A financial management app named Finance Simplified has been revealed as a malicious tool for…

9 hours ago

Poseidon Mac Malware Hiding Within PKG Files to Evade Detections

A recent discovery by cybersecurity researchers has revealed that the Poseidon malware, a macOS-targeting trojan,…

9 hours ago