BlackRock malware targets banking apps

Bitdefender_News

Share post

A new banking malware is spreading on Android devices right now. It uses the source code of the now inoperable malware Xerxes and an even older variant called LokiBot. With the malware, the hackers target apps that have already been manipulated in other malware campaigns.

A new banking malware is spreading on Android devices right now. It uses the source code of the now inoperable malware Xerxes and an even older variant called LokiBot. With the malware, the hackers target apps that have already been manipulated in other malware campaigns.

Operating systems are constantly evolving, but that is exactly what banking Trojans do when they try to establish themselves on these systems. When Trojans are hidden within apps, they are usually discovered before they can be distributed through official app stores. That's why cyber criminals usually offer them through unofficial app stores and shady websites.

When a new version of Android is released, the old malware will stop working. So new versions appear, mostly based on old code. The current BlackRock variant z. B. uses code elements, some of which are 4 years old.

ThreatFabric has investigated how BlackRock behaves when the malware has infected a device. As expected, all data can be manipulated. “When the malware is first running on the device, the first thing to do is hide the app icon so that the user doesn't notice it,” say the malware experts. “Next, the app asks the user to grant her rights for the Android accessibility features. It often disguises itself as a Google update. "

The accessibility feature on Android has a completely different purpose, but it is very comprehensive and is therefore often used by malware authors to obtain the necessary permissions.

BlackRock spies on credit card details and banking passwords

BlackRock can send SMS, send SMS copies of personal emails to control and command centers, launch apps at startup, force devices to show the home screen continuously, add a device administrator profile for the app, and much more.

Since it is a banking Trojan, it will attempt to access credit card details and banking passwords - either through form grabbing or with app-specific phishing overlays. The malware directs the user to files stored locally instead of the online version, and the data is then sent to the C&C center.

Many apps that are infected by the malware have nothing to do with finance, but are social media, text messaging or dating apps. A lot of data can be accessed here, which in turn can be useful in other campaigns. The targeted destinations are mainly European banks and users, followed by Australian and North American ones.

 

More on this on the blog at Bitdefender.com

 


About Bitdefender

Bitdefender is a leading global provider of cybersecurity solutions and antivirus software, protecting over 500 million systems in more than 150 countries. Since it was founded in 2001, the company's innovations have consistently ensured excellent security products and intelligent protection for devices, networks and cloud services for private customers and companies. As the supplier of choice, Bitdefender technology is found in 38 percent of security solutions deployed around the world and is trusted and recognized by industry experts, manufacturers and customers alike. www.bitdefender.de


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more