• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
fluhorse: flutter based android malware targets credit cards and 2fa codes

Fluhorse: Flutter-Based Android Malware Targets Credit Cards and 2FA Codes

You are here: Home / General Cyber Security News / Fluhorse: Flutter-Based Android Malware Targets Credit Cards and 2FA Codes
June 29, 2023

Cybersecurity researchers have shared the interior workings of an Android malware loved ones named Fluhorse.

The malware “signifies a major shift as it incorporates the malicious parts right in just the Flutter code,” Fortinet FortiGuard Labs researcher Axelle Apvrille explained in a report posted last week.

Fluhorse was first documented by Test Level in early May 2023, detailing its attacks on consumers found in East Asia by way of rogue apps masquerading as Etc and VPBank Neo, which are well known in Taiwan and Vietnam. The initial intrusion vector for the malware is phishing.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The top aim of the application is to steal qualifications, credit card facts, and two-factor authentication (2FA) codes been given as SMS to a remote server underneath the regulate of the threat actors.

Cybersecurity

The most up-to-date findings from Fortinet, which reverse-engineered a Fluhorse sample uploaded to VirusTotal on June 11, 2023, suggest that the malware has progressed, incorporating further sophistication by concealing the encrypted payload in a packer.

“Decryption is performed at the native amount (to harden reverse engineering) applying OpenSSL’s EVP cryptographic API,” Apvrille explained. The encryption algorithm is AES-128-CBC, and its implementation takes advantage of the identical really hard-coded string for the vital and initialization vector (IV).”

The decrypted payload, a ZIP file, consists of in just it a Dalvik executable file (.dex), which is then mounted on the device to pay attention to incoming SMS messages and exfiltrate them to the distant server.

“Reversing Flutter apps statically is a breakthrough for anti-virus scientists, as, unfortunately, additional malicious Flutter apps are predicted to be produced in the long run,” Apvrille claimed.

Discovered this article intriguing? Adhere to us on Twitter  and LinkedIn to read extra distinctive content material we article.


Some elements of this report are sourced from:
thehackernews.com

Previous Post: «the right way to enhance cti with ai (hint: it's The Right Way to Enhance CTI with AI (Hint: It’s the Data)
Next Post: From MuddyC3 to PhonyC2: Iran’s MuddyWater Evolves with a New Cyber Weapon from muddyc3 to phonyc2: iran's muddywater evolves with a new»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • 6 Steps to 24/7 In-House SOC Success
  • Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
  • 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
  • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
  • Secure Vibe Coding: The Complete New Guide
  • Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
  • Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.