• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
vultur android banking trojan returns with upgraded remote control capabilities

Vultur Android Banking Trojan Returns with Upgraded Remote Control Capabilities

You are here: Home / General Cyber Security News / Vultur Android Banking Trojan Returns with Upgraded Remote Control Capabilities
April 1, 2024

The Android banking trojan regarded as Vultur has resurfaced with a suite of new capabilities and enhanced anti-evaluation and detection evasion approaches, enabling its operators to remotely interact with a mobile system and harvest sensitive information.

“Vultur has also started out masquerading much more of its destructive activity by encrypting its C2 conversation, utilizing several encrypted payloads that are decrypted on the fly, and applying the guise of legit apps to carry out its destructive steps,” NCC Team researcher Joshua Kamp explained in a report revealed past 7 days.

Vultur was initial disclosed in early 2021, with the malware capable of leveraging Android’s accessibility services APIs to execute its malicious actions.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The malware has been observed to be dispersed through trojanized dropper applications on the Google Engage in Retailer, masquerading as authenticator and efficiency applications to trick unwitting buyers into setting up them. These dropper apps are supplied as component of a dropper-as-a-provider (DaaS) procedure named Brunhilda.

Other attack chains, as observed by NCC Team, include the droppers remaining unfold working with a mix of SMS messages and phone phone calls – a procedure known as phone-oriented attack delivery (TOAD) – to finally serve an current variation of the malware.

Cybersecurity

“The 1st SMS concept guides the victim to a phone get in touch with,” Kamp stated. When the victim phone calls the amount, the fraudster presents the target with a second SMS that involves the url to the dropper: a modified edition of the [legitimate] McAfee Security application.”

The original SMS information aims to induce a untrue feeling of urgency by instructing the recipients to call a variety to authorize a non-existent transaction that includes a significant sum of money.

Upon installation, the destructive dropper executes a few associated payloads (two APKs and just one DEX file) that sign up the bot with the C2 server, acquire accessibility companies permissions for distant obtain by means of AlphaVNC and ngrok, and operate instructions fetched from the C2 server.

One of the notable additions to Vultur is the ability to remotely interact with the infected system, including carrying out clicks, scrolls, and swipes, through Android’s accessibility companies, as effectively as down load, add, delete, set up, and come across files.

In addition, the malware is geared up to protect against the victims from interacting with a predefined listing of apps, exhibit tailor made notifications in the status bar, and even disable Keyguard to bypass lock display screen security actions.

Android Banking Trojan

“Vultur’s modern developments have revealed a change in focus in direction of maximizing remote control about contaminated gadgets,” Kamp said.

“With the functionality to issue commands for scrolling, swipe gestures, clicks, quantity management, blocking apps from managing, and even incorporating file supervisor functionality, it is crystal clear that the most important goal is to achieve whole management more than compromised gadgets.”

The development will come as Group Cymru revealed the Octo (aka Coper) Android banking trojan’s changeover to a malware-as-a-company procedure, giving its providers to other risk actors for conducting facts theft.

“The malware delivers a wide range of superior options, like keylogging, interception of SMS messages and force notifications, and command above the device’s display,” the company mentioned.

Cybersecurity

“It employs numerous injects to steal sensitive details, these as passwords and login qualifications, by displaying phony screens or overlays. Furthermore, it utilizes VNC (Digital Network Computing) for distant entry to units, enhancing its surveillance abilities.”

Octo strategies are approximated to have compromised 45,000 devices, generally spanning Portugal, Spain, Turkey, and the U.S. Some of the other victims are situated in France, the Netherlands, Canada, India, and Japan.

The conclusions also adhere to the emergence of a new marketing campaign targeting Android consumers in India that distributes destructive APK offers posing as on line booking, billing, and courier solutions by using a malware-as-a-provider (MaaS) supplying.

The malware “targets theft of banking facts, SMS messages, and other private information from victims’ gadgets,” Broadcom-owned Symantec explained in a bulletin.

Identified this post attention-grabbing? Abide by us on Twitter  and LinkedIn to study more exclusive information we post.


Some parts of this report are sourced from:
thehackernews.com

Previous Post: «new webinar: avoiding application security blind spots with opswat and New Webinar: Avoiding Application Security Blind Spots with OPSWAT and F5Mar 28, 2024Application Security / Webinar Considering the ever-changing state of cybersecurity, it's never too late to ask yourself, "am I doing what's necessary to keep my organization's web applications secure?" The continuous evolution of technology introduces new and increasingly sophisticated threats daily, posing challenges to organizations all over the world and across the broader spectrum of industries striving to maintain reliable defenses. 2024 promises to be no exception. Threat actors continue to adapt their tactics, techniques, and procedures to exploit vulnerabilities in innovative ways, injecting malicious content into files that bypass traditional antivirus solutions and advanced, AI and ML-powered solutions alike. Therefore, organizations must assess and continually reinforce their security measures. One critical aspect that organizations often grapple with is identifying and addressing security blind spots. These are areas within the infrastructure where vulnerabilities exist but may
Next Post: Malicious Apps Caught Secretly Turning Android Phones into Proxies for Cybercriminals malicious apps caught secretly turning android phones into proxies for»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • 6 Steps to 24/7 In-House SOC Success
  • Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
  • 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
  • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
  • Secure Vibe Coding: The Complete New Guide
  • Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
  • Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.