• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
xenomorph android banking trojan returns with a new and more

Xenomorph Android Banking Trojan Returns with a New and More Powerful Variant

You are here: Home / General Cyber Security News / Xenomorph Android Banking Trojan Returns with a New and More Powerful Variant
March 10, 2023

A new variant of the Android banking trojan named Xenomorph has surfaced in the wild, the most up-to-date findings from ThreatFabric reveal.

Named “Xenomorph 3rd generation” by the Hadoken Security Team, the danger actor at the rear of the procedure, the current edition comes with new features that allow it to conduct economical fraud in a seamless way.

“This new edition of the malware provides a lot of new abilities to an presently function-abundant Android banker, most notably the introduction of a incredibly intensive runtime engine run by Accessibility products and services, which is utilized by actors to put into action a total ATS framework,” the Dutch security business reported in a report shared with The Hacker Information.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Xenomorph very first arrived to light-weight a 12 months in the past in February 2022, when it was observed to goal 56 European financial institutions by means of dropper applications printed on the Google Engage in Keep.

In distinction, the most up-to-date iteration of the banker – which has a committed web-site marketing its capabilities – is designed to concentrate on more than 400 banking and money establishments, which include several cryptocurrency wallets.

Xenomorph Android Banking Trojan

ThreatFabric claimed it detected samples dispersed by means of Discord’s Content material Delivery Network (CDN), a procedure that has witnessed a surge since 2020. Two of the Xenomorph-laced apps are shown below –

  • Participate in Protect (com.great.relaxed)
  • Participate in Defend (meritoriousness.mollah.presser)

“Xenomorph v3 is deployed by a Zombinder app ‘bound’ to a authentic currency converter, which downloads as an ‘update’ an application posing as Google Shield,” ThreatFabric stated.

Zombinder refers to an APK binding company marketed on the dark web considering that March 2022, wherein the malware is delivered by way of trojanized versions of legit applications. The providing has considering that been shut down.

Targets of the hottest campaign go further than its European target (i.e., Spain, Italy, and Portugal) to consist of Belgian and Canadian money entities.

WEBINARDiscover the Concealed Risks of Third-Party SaaS Applications

Are you aware of the challenges related with third-party app entry to your company’s SaaS applications? Sign up for our webinar to learn about the kinds of permissions being granted and how to minimize risk.

RESERVE YOUR SEAT

Xenomorph, like banking malware, is known to abuse Accessibility Services to conduct fraud through overlay attacks. It also packs in capabilities to routinely entire fraudulent transactions on infected products, a method identified as Automatic Transfer Program (ATS).

Xenomorph Android Banking Trojan

With banking companies going absent from SMS for two-factor authentication (2FA) to authenticator applications, the Xenomorph trojan incorporates an ATS module that will allow it to launch the application and extract the authenticator codes.

The Android malware even further offers of cookie-stealing features, enabling the menace actors to accomplish account takeover attacks.

“With these new attributes, Xenomorph is now able to fully automate the whole fraud chain, from an infection to funds exfiltration, earning it 1 of the most innovative and harmful Android Malware trojans in circulation,” the company said.

Found this report appealing? Follow us on Twitter  and LinkedIn to study extra distinctive information we write-up.


Some pieces of this report are sourced from:
thehackernews.com

Previous Post: «Cyber Security News UK’s New Privacy Bill Could Mean More Work for Firms
Next Post: FBI Warns of Crypto-Stealing Play-to-Earn Games Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month
  • Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks
  • New “Brash” Exploit Crashes Chromium Browsers Instantly with a Single Malicious URL

Copyright © TheCyberSecurity.News, All Rights Reserved.