Hundreds of thousands of Android users infected by banking malware hosted on Play Store .:. Andy Rixon
Hundreds of thousands of Android users infected by banking malware hosted on Play Store

Researchers say the trojans have caused significant losses at the targeted banks

In another instance of threat actors sneaking malware-ridden apps past Google's threat detection filters, cybersecurity researchers have revealed that over 300,000 users have downloaded malicious Android apps containing banking trojans.

The researchers at ThreatFabric have identified four families of banking trojans that have recently been distributed via Google Play. In a breakdown of the modus operandi, they note that these strains have collectively led to “significant” financial losses for the targeted banks.

The four trojans hid inside all kinds of apps, with the most prominent one named Anatsa, which alone accounted for over 200,000 downloads. The researchers found Anatsa inside apps that posed as QR code scanners, document scanners, and cryptocurrency apps. 

Difficult to detect
The major takeaway from the analysis is the extent to which the apps went to avoid being flagged.

“A noticeable trend in the new dropper campaigns is that actors are focusing on loaders with a reduced malicious footprint in Google Play, considerably increasing the difficulties in detecting them with automation and machine learning techniques,” note the researchers.

Furthermore, according to the analysis, the threat actors only manually activate the installation of the banking trojan on an infected device in case they need to lure more victims in a specific region of the world. This behavior further complicates the discovery of the trojans using automated detection mechanisms.

It's no surprise, then, that the researchers say that almost all of the trojans had a very low score on VirusTotal at some point in time.

"A good rule of thumb is to always check updates and always be very careful before granting accessibility services privileges – which will be requested by the malicious payload, after the "update" installation – and be wary of applications that ask to install additional software," said Dario Durando, mobile malware specialist at ThreatFabric, sharing a strategy with ZDNet to help users detect trojanized apps. 

News by Andy Rixon, created 30 Nov, 2021

Share on
User Login
Login today to access more features..
Forgot Password?
Find what you need
Looking for something specific?
Author Information

Andy Rixon

As you can see, my name is Andy. If you would like to know more about me, please check out my about page.

View Profile
© 2022 Andy Rixon
All images are copyright to their respective owners

Made with by VortexCMS
Follow on