• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
200+ malicious android apps targeting iranian banks: experts warn

200+ Malicious Android Apps Targeting Iranian Banks: Experts Warn

You are here: Home / General Cyber Security News / 200+ Malicious Android Apps Targeting Iranian Banks: Experts Warn
November 29, 2023

An Android malware campaign concentrating on Iranian financial institutions has expanded its abilities and incorporated extra evasion practices to fly below the radar.

That is in accordance to a new report from Zimperium, which discovered much more than 200 destructive apps related with the destructive operation, with the risk actor also noticed carrying out phishing attacks against the focused money institutions.

The marketing campaign to start with came to gentle in late July 2023 when Sophos comprehensive a cluster of 40 credential-harvesting apps targeting clients of Lender Mellat, Lender Saderat, Resalat Lender, and Central Financial institution of Iran.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The primary aim of the bogus applications is to trick victims into granting them intensive permissions as properly as harvest banking login credentials and credit rating card details by abusing Android’s accessibility solutions.

“The corresponding authentic versions of the destructive apps are accessible at Cafe Bazaar, an Iranian Android marketplace, and have hundreds of thousands of downloads,” Sophos researcher Pankaj Kohli explained at the time.

Cybersecurity

“The malicious imitations, on the other hand, ended up offered to down load from a large selection of comparatively new domains, some of which the risk actors also employed as C2 servers.”

Apparently, some of these domains have also been observed to serve HTML phishing internet pages made to steal credentials from cell consumers.

The newest results from Zimperium illustrate continued evolution of the danger, not only in terms of a broader set of specific banking institutions and cryptocurrency wallet apps, but also incorporating formerly undocumented features that make it much more strong.

This includes the use of the accessibility company to grant it additional permissions to intercept SMS messages, prevent uninstallation, and click on on consumer interface aspects.

Some variants of the malware have also been observed to obtain a README file within GitHub repositories to extract a Base64-encoded version of the command-and-management (C2) server and phishing URLs.

“This permits attackers to quickly respond to phishing web sites currently being taken down by updating the GitHub repository, making certain that malicious apps are normally acquiring the hottest active phishing internet site,” Zimperium scientists Aazim Yaswant and Vishnu Pratapagiri reported.

One more noteworthy tactic is the use of intermediate C2 servers to host textual content information that include the encoded strings pointing to the phishing internet sites.

Though the marketing campaign has so significantly skilled its eyes on Android, there is proof that Apple’s iOS operating program is also a prospective target primarily based on the truth that the phishing web pages verify if the web page is opened by an iOS device, and if so, immediate the sufferer to a internet site mimicking the iOS model of the Financial institution Saderat Iran application.

It can be at the moment not obvious if the iOS campaign is less than advancement levels, or if the apps are dispersed by an, as of but, unknown source.

Cybersecurity

The phishing campaigns are no considerably less complex, impersonating the true internet sites to exfiltrate qualifications, account numbers, machine styles, and IP addresses to two actor-managed Telegram channels.

“It is obvious that present day malware is turning out to be much more refined, and targets are expanding, so runtime visibility and security are very important for cell programs,” the researchers reported.

The progress will come a small about a thirty day period following Fingerprint shown a approach by which malicious Android applications can stealthily access and duplicate clipboard information by leveraging the System_Alert_WINDOW authorization to obscure the toast notification which is shown when a certain application is looking at clipboard knowledge.

“It truly is feasible to overdraw a toast either with a different toast or with any other view, absolutely hiding the initial toast can avoid the consumer from currently being notified of clipboard actions,” Fingerprint mentioned. “Any application with the Program_Alert_WINDOW permission can read through clipboard details without having notifying the person.”

Found this article appealing? Follow us on Twitter  and LinkedIn to study much more unique information we publish.


Some pieces of this post are sourced from:
thehackernews.com

Previous Post: «discover why proactive web security outsmarts traditional antivirus solutions Discover Why Proactive Web Security Outsmarts Traditional Antivirus Solutions
Next Post: Iranian Hackers Exploit PLCs in Attack on Water Authority in U.S. iranian hackers exploit plcs in attack on water authority in»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.