Godfather Banking Trojan Masquerades as Legitimate Google Play App

0
271

[ad_1]

A kind of Android malware that is been focusing on banking customers worldwide since March has resurfaced with superior obfuscation strategies, masquerading as a authentic software on the Google Play retailer with greater than 10 million downloads, researchers have discovered.

Godfather is a banking Trojan that’s finest recognized for focusing on banking customers in European international locations, however its newest exercise reveals an elevated sophistication in its means to fly underneath the radar of frequent malware-detection strategies, researchers from Cyble Research & Intelligence Labs (CRIL) mentioned in a weblog submit on Dec. 20.

Once it is efficiently put in on a sufferer’s machine, Godfather initiates a sequence of typical banking Trojan behaviors, together with stealing banking and crypto-exchange credentials, the researchers mentioned. But it additionally steals delicate knowledge reminiscent of SMSs, primary machine particulars — together with knowledge from put in functions — and the machine’s cellphone quantity, and it may well carry out a lot of nefarious actions silently within the background.

“Apart from these, it may well additionally management the machine display utilizing VNC [virtual network computing], forwarding incoming calls of the sufferer’s machine and injecting banking URLs,” the Cyble researchers wrote.

The newest pattern of Godfather that researchers found was encrypted utilizing customized encryption methods that would evade detection by frequent antivirus merchandise — a brand new tactic of the risk actors behind the malware, the researchers mentioned.

Targeting Businesses & Consumers

Upon additional examination, the researchers discovered that the malware was utilizing an icon and title just like the authentic Google Play app MYT Music, which already has logged greater than 10 million downloads. Indeed, risk actors typically conceal malware on Google Play, regardless of Google’s finest efforts within the final a number of years to maintain unhealthy apps off its retailer earlier than customers are affected by it.

MYT Music was written within the Turkish language and thus researchers assume the Godfather pattern they found is focusing on Android customers in Turkey. However, they believe different variations of the malware proceed to be lively and focusing on banking customers worldwide.

Though banking Trojans are likely to have an effect on customers greater than the enterprise, enterprise customers are nonetheless in danger as a result of they use their cell units at work and will even have enterprise apps and knowledge saved on their units. For this cause, enterprise customers needs to be particularly cautious of downloading apps from the Internet or opening any hyperlinks acquired by way of SMS or emails delivered to a cell phone, the researchers mentioned.

Google Play has eliminated the app, however these with it put in are nonetheless in danger.

How Godfather Pulls Victims’ Strings

Once it is put in on an Android machine, Godfather requests 23 completely different permissions from the machine, abusing a lot of them to realize entry to a consumer’s contacts and the state of the machine, in addition to data associated to the consumer account. It can also write or delete recordsdata in exterior storage and disable the keylock and any related password safety, the Cyble researchers mentioned.

Godfather can efficiently do cash transfers from a hacked machine by its means to provoke cellphone calls by Unstructured Supplementary Service Data (USSD) that do not require use of the dialer consumer interface, and thus do not want the consumer to substantiate the decision, they mentioned.

The malware additionally extracts delicate consumer knowledge from the machine — together with software key logs — that may be despatched again to a command-and-control (C2) server, which additionally sends Godfather a command that forwards any incoming calls the sufferer receives to a quantity offered by the risk actor, the researchers mentioned.

Godfather then harvests credentials: It creates an overlay window within the OnAccessibilityEvent technique and injects HTML phishing pages by way of a separate command from C2, the server URL of which is from a Telegram channel, hxxps://t[.]me/varezotukomirza, the researchers mentioned.

Once it completes its malicious exercise, Godfather receives a “killbot” command from C2 to self-terminate, they added.

Avoiding Being Whacked by Godfather

The most typical approach to keep away from downloading cell app malware is to obtain and set up software program solely from official app shops reminiscent of Google Play or Apple, the traditional knowledge goes.

However, as this occasion proves, malware can lurk in official app shops too, so “training primary cyber-hygiene throughout cell units and on-line banking functions successfully prevents such malware from compromising your units,” the researchers famous within the submit, together with utilizing a good antivirus and Internet safety software program package deal on related units to make sure something downloaded is free from malware.

Also, superior anti-detection strategies like those the risk actors behind Godfather are utilizing could make even downloading what appear to be authentic apps difficult, they mentioned. To additional shield themselves, customers can make the most of robust passwords and implement multifactor authentication on units wherever attainable, making it harder for risk actors to crack into their accounts. 

Android machine customers additionally ought to be sure that Google Play Protect is enabled on their units for additional safety safety, the Cyble researchers added.

All cell machine customers additionally ought to allow biometric safety features reminiscent of fingerprint or facial recognition for unlocking the cell machine and utilizing apps, the place attainable, and be particularly cautious when enabling permissions on units, particularly if an app has not been verified by a good supplier, they added.

LEAVE A REPLY

Please enter your comment!
Please enter your name here