• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
teabot android banking malware spreads again through google play store

TeaBot Android Banking Malware Spreads Again Through Google Play Store Apps

You are here: Home / General Cyber Security News / TeaBot Android Banking Malware Spreads Again Through Google Play Store Apps
March 2, 2022

An Android banking trojan built to steal qualifications and SMS messages has been observed sneaking earlier Google Perform Keep protections to concentrate on end users of extra than 400 banking and economical applications from Russia, China, and the U.S.

“TeaBot RAT abilities are reached by way of the device screen’s dwell streaming (asked for on-need) in addition the abuse of Accessibility Products and services for distant interaction and key-logging,” Cleafy scientists said in a report. “This enables Threat Actors (TAs) to execute ATO (Account Takeover) straight from the compromised phone, also identified as ‘On-unit fraud.'”

Automatic GitHub Backups

✔ Approved Seller From Our Partners
Malwarebytes Premium 2022

Protect yourself against all threads using Malwarebytes. Get Malwarebytes Premium with 60% discount from a Malwarebytes official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Also regarded by the identify Anatsa, TeaBot to start with emerged in Could 2021, camouflaging its destructive functions by posing as seemingly innocuous PDF document and QR code scanner apps that are dispersed by means of the formal Google Play Retail outlet in its place of third-party apps outlets or by way of fraudulent websites.

These apps, also recognised as dropper purposes, act as a conduit to deliver a next-phase payload that retrieves the malware pressure to consider manage of the infected units. In November 2021, Dutch security company ThreatFabric disclosed that it experienced discovered six Anatsa droppers on the Engage in Retail store considering the fact that June final year.

Then before this January, Bitdefender scientists identified TeaBot lurking in the official Android application market as a “QR Code Reader – Scanner App,” gaining extra than 100,000 downloads in just a span of a thirty day period before it was taken down.

The hottest model of TeaBot dropper spotted by Cleafy on February 21, 2022, is also a QR code reader app named “QR Code & Barcode – Scanner” which has been downloaded around 10,000 occasions from the Play Retail store.

The moment installed the modus operandi is the exact: prompt consumers to settle for a phony incorporate-on update, which, in flip, potential customers to the set up of a second application hosted on GitHub that basically includes the TeaBot malware. It really is, even so, well worth noting that people need to have to make it possible for installs from not known sources for this attack chain to be prosperous.

Prevent Data Breaches

The very last period of the infection includes the banking trojan searching for Accessibility Providers permissions to seize delicate info like login qualifications and two-factor authentication codes with the intention of getting over the accounts to have out on-unit fraud.

“In considerably less than a yr, the variety of programs specific by TeaBot have grown additional than 500%, going from 60 targets to around 400,” the scientists said, incorporating the malware now strikes many apps connected to personalized banking, insurance coverage, crypto wallets, and crypto exchanges.

Found this short article fascinating? Observe THN on Facebook, Twitter  and LinkedIn to go through much more exceptional written content we submit.


Some components of this post are sourced from:
thehackernews.com

Previous Post: «rce bugs in other hugely popular voip apps: patch now! RCE Bugs in Other Hugely Popular VoIP Apps: Patch Now!
Next Post: Critical Security Bugs Uncovered in VoIPmonitor Monitoring Software critical security bugs uncovered in voipmonitor monitoring software»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • FBI, CISA Warn of Russian Hackers Exploiting MFA and PrintNightmare Bug
  • Unpatched RCE Bug in dompdf Project Affects HTML to PDF Converters
  • NortonLifeLock and Avast merger could reduce competition, CMA warns
  • Thousands of Mobile Apps Expose User Data Via Cloud Misconfigurations
  • NSW ditches e-voting system for 2023 election
  • Kaspersky Hits Back at “Politically Motivated” BSI Advisory
  • Germany advises against using Kaspersky software due to hacking risk
  • CISA: Fix MFA and Patch Promptly to Stop Russian Attackers
  • German Government Warns Against Using Russia’s Kaspersky Antivirus Software
  • Multiple Flaws Uncovered in ClickHouse OLAP Database System for Big Data

Copyright © TheCyberSecurity.News, All Rights Reserved.