Hundreds of thousands of Android users infected by banking malware hosted on Play Store

Read Time:1 Minute, 35 Second

In another instance of threat actors sneaking malware-ridden apps past Google’s threat detection filters, cybersecurity researchers have revealed that over 300,000 users have downloaded malicious Android apps containing banking trojans.

The researchers at ThreatFabric have identified four families of banking trojans that have recently been distributed via Google Play. In a breakdown of the modus operandi, they note that these strains have collectively led to “significant” financial losses for the targeted banks.

The four trojans hid inside all kinds of apps, with the most prominent one named Anatsa, which alone accounted for over 200,000 downloads. The researchers found Anatsa inside apps that posed as QR code scanners, document scanners, and cryptocurrency apps. 

Difficult to detect
The major takeaway from the analysis is the extent to which the apps went to avoid being flagged.

“A noticeable trend in the new dropper campaigns is that actors are focusing on loaders with a reduced malicious footprint in Google Play, considerably increasing the difficulties in detecting them with automation and machine learning techniques,” note the researchers.

Furthermore, according to the analysis, the threat actors only manually activate the installation of the banking trojan on an infected device in case they need to lure more victims in a specific region of the world. This behavior further complicates the discovery of the trojans using automated detection mechanisms.

It’s no surprise, then, that the researchers say that almost all of the trojans had a very low score on VirusTotal at some point in time.

“A good rule of thumb is to always check updates and always be very careful before granting accessibility services privileges – which will be requested by the malicious payload, after the “update” installation – and be wary of applications that ask to install additional software,” said Dario Durando, mobile malware specialist at ThreatFabric, sharing a strategy with ZDNet to help users detect trojanized apps. 

About Post Author

Andy Rixon

Check out my about me page which is linked in the above navbar
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x