• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
200+ malicious android apps targeting iranian banks: experts warn

200+ Malicious Android Apps Targeting Iranian Banks: Experts Warn

You are here: Home / General Cyber Security News / 200+ Malicious Android Apps Targeting Iranian Banks: Experts Warn
November 29, 2023

An Android malware campaign concentrating on Iranian financial institutions has expanded its abilities and incorporated extra evasion practices to fly below the radar.

That is in accordance to a new report from Zimperium, which discovered much more than 200 destructive apps related with the destructive operation, with the risk actor also noticed carrying out phishing attacks against the focused money institutions.

The marketing campaign to start with came to gentle in late July 2023 when Sophos comprehensive a cluster of 40 credential-harvesting apps targeting clients of Lender Mellat, Lender Saderat, Resalat Lender, and Central Financial institution of Iran.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The primary aim of the bogus applications is to trick victims into granting them intensive permissions as properly as harvest banking login credentials and credit rating card details by abusing Android’s accessibility solutions.

“The corresponding authentic versions of the destructive apps are accessible at Cafe Bazaar, an Iranian Android marketplace, and have hundreds of thousands of downloads,” Sophos researcher Pankaj Kohli explained at the time.

Cybersecurity

“The malicious imitations, on the other hand, ended up offered to down load from a large selection of comparatively new domains, some of which the risk actors also employed as C2 servers.”

Apparently, some of these domains have also been observed to serve HTML phishing internet pages made to steal credentials from cell consumers.

The newest results from Zimperium illustrate continued evolution of the danger, not only in terms of a broader set of specific banking institutions and cryptocurrency wallet apps, but also incorporating formerly undocumented features that make it much more strong.

This includes the use of the accessibility company to grant it additional permissions to intercept SMS messages, prevent uninstallation, and click on on consumer interface aspects.

Some variants of the malware have also been observed to obtain a README file within GitHub repositories to extract a Base64-encoded version of the command-and-management (C2) server and phishing URLs.

“This permits attackers to quickly respond to phishing web sites currently being taken down by updating the GitHub repository, making certain that malicious apps are normally acquiring the hottest active phishing internet site,” Zimperium scientists Aazim Yaswant and Vishnu Pratapagiri reported.

One more noteworthy tactic is the use of intermediate C2 servers to host textual content information that include the encoded strings pointing to the phishing internet sites.

Though the marketing campaign has so significantly skilled its eyes on Android, there is proof that Apple’s iOS operating program is also a prospective target primarily based on the truth that the phishing web pages verify if the web page is opened by an iOS device, and if so, immediate the sufferer to a internet site mimicking the iOS model of the Financial institution Saderat Iran application.

It can be at the moment not obvious if the iOS campaign is less than advancement levels, or if the apps are dispersed by an, as of but, unknown source.

Cybersecurity

The phishing campaigns are no considerably less complex, impersonating the true internet sites to exfiltrate qualifications, account numbers, machine styles, and IP addresses to two actor-managed Telegram channels.

“It is obvious that present day malware is turning out to be much more refined, and targets are expanding, so runtime visibility and security are very important for cell programs,” the researchers reported.

The progress will come a small about a thirty day period following Fingerprint shown a approach by which malicious Android applications can stealthily access and duplicate clipboard information by leveraging the System_Alert_WINDOW authorization to obscure the toast notification which is shown when a certain application is looking at clipboard knowledge.

“It truly is feasible to overdraw a toast either with a different toast or with any other view, absolutely hiding the initial toast can avoid the consumer from currently being notified of clipboard actions,” Fingerprint mentioned. “Any application with the Program_Alert_WINDOW permission can read through clipboard details without having notifying the person.”

Found this article appealing? Follow us on Twitter  and LinkedIn to study much more unique information we publish.


Some pieces of this post are sourced from:
thehackernews.com

Previous Post: «discover why proactive web security outsmarts traditional antivirus solutions Discover Why Proactive Web Security Outsmarts Traditional Antivirus Solutions
Next Post: Iranian Hackers Exploit PLCs in Attack on Water Authority in U.S. iranian hackers exploit plcs in attack on water authority in»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Copyright © TheCyberSecurity.News, All Rights Reserved.