• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

These Dropper Apps On Play Store Targeting Over 200 Banking and Cryptocurrency Wallets

You are here: Home / General Cyber Security News / These Dropper Apps On Play Store Targeting Over 200 Banking and Cryptocurrency Wallets
October 28, 2022

5 malicious dropper Android apps with around 130,000 cumulative installations have been uncovered on the Google Participate in Shop distributing banking trojans like SharkBot and Vultur, which are able of thieving economical knowledge and executing on-product fraud.

“These droppers continue the unstopping evolution of destructive apps sneaking to the formal retailer,” Dutch cell security organization ThreatFabric advised The Hacker Information in a assertion.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“This evolution includes next recently released procedures and masquerading as file administrators and overcoming limitations by side-loading the destructive payload via the web browser.”

Targets of these droppers contain 231 banking and cryptocurrency wallet apps from financial establishments in Italy, the U.K., Germany, Spain, Poland, Austria, the U.S., Australia, France, and the Netherlands.

Dropper applications on formal app shops like Google Perform have increasingly grow to be a popular and successful procedure to distribute banking malware to unsuspecting buyers, even as the danger actors driving these strategies continually refine their tactics to bypass constraints imposed by Google.

The list of malicious apps, four of which are continue to obtainable on the digital market, is below –

  • Codice Fiscale 2022 (com.iatalytaxcode.app) – 10,000+ downloads
  • File Supervisor Little, Lite (com.paskevicss752.usurf) – zero downloads
  • My Funds Tracker (com.all.finance.additionally) – 1,000+ downloads
  • Get well Audio, Illustrations or photos & Movies (com.umac.recoverallfilepro) – 100,000+ downloads
  • Zetter Authenticator (com.zetter.fastchecking) – 10,000+ downloads

The most recent wave of SharkBot attacks aimed at Italian banking consumers considering that the start off of Oct 2022 entailed the use of a dropper that masqueraded as an to identify the tax code in the nation (“Codice Fiscale 2022”).

Although Google’s Developer Plan Policy restrictions the use of the Request_Put in_Offers authorization to prevent it from staying abused to set up arbitrary app packages, the dropper, the moment released, gets around this barrier by opening a fake Google Enjoy shop webpage impersonating the app listing, leading to the down load of the malware less than the guise of an update.

Outsourcing the malware retrieval to the browser is not the only technique adopted by legal actors. In a different instance noticed by ThreatFabric, the dropper posed as a file supervisor app, which, per Google’s revised policy, is a category which is allowed to have the Request_Put in_Packages permission.

CyberSecurity

Also spotted ended up a few droppers that provided the marketed features but also arrived with a covert functionality that prompted the buyers to set up an update on opening the apps and grant them authorization to put in apps from unknown sources, leading to the supply of Vultur.

The new variant of the trojan is notable for incorporating capabilities to extensively log person interface elements and interaction gatherings (e.g., clicks, gestures, etcetera.), which ThreatFabric reported could be a workaround to the use of the FLAG_Protected window flag by banking applications to avert them from getting captured in screenshots.

The conclusions from ThreatFabric also occur as Cyble uncovered an upgraded edition of the Drinik Android trojan that targets 18 Indian banking companies by impersonating the country’s formal tax section application to siphon personalized info by way of the abuse of the accessibility products and services API.

“Distribution through droppers on Google Engage in nevertheless stays the most ‘affordable’ and scalable way of achieving victims for most of the actors of different stages,” the organization mentioned.

“Though refined practices like phone-oriented attack shipping and delivery demand more assets and are difficult to scale, droppers on formal and third-party retailers permit menace actors to arrive at a large unsuspecting viewers with reasonable efforts.”

Located this report appealing? Observe THN on Facebook, Twitter  and LinkedIn to read much more exclusive written content we put up.


Some components of this report are sourced from:
thehackernews.com

Previous Post: «cloud security made simple in new guidebook for lean teams Cloud Security Made Simple in New Guidebook For Lean Teams
Next Post: High-Severity Flaws in Juniper Junos OS Affect Enterprise Networking Devices high severity flaws in juniper junos os affect enterprise networking devices»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.