Tuesday, November 12, 2024
HomeAndroidMalware Spotted on the Google Play Store Steals Banking Credentials & Intercepts...

Malware Spotted on the Google Play Store Steals Banking Credentials & Intercepts SMS Messages

Published on

Malware protection

The Zscaler ThreatLabz team found the ‘Xenomorph’ banking trojan embedded in a Lifestyle app in the Google Play store.

The app’s name is “Todo: Day Manager,” and has more than 1,000 downloads. 

The trojan called ‘Xenomorph’ steals login information from users’ devices’ banking applications.

- Advertisement - SIEM as a Service

Additionally, it has the ability to intercept users’ SMS messages and notifications, enabling it access to one-time passwords and requests for multifactor authentication.

“Our analysis found that the Xenomorph banking malware is dropped from GitHub as a fake Google Service application upon installation of the app”, the Zscaler ThreatLabz team

“It starts with asking users to enable access permission. Once provided, it adds itself as a device admin and prevents users from disabling Device Admin, making it uninstallable from the phone”.

Xenomorph Infection Cycle

The application obtains the banking malware payload URL when it is first launched by connecting to a Firebase server

The malicious Xenomorph banking malware samples are then downloaded from Github.

Later, to seek more commands and spread the infection, this financial malware contacts the command-and-control (C2) servers using Telegram page content or a static code routine.

Xenomorph Infection Cycle

Researchers say the malware will only download further banking payloads if the “Enabled” parameter is set to true. Also, the banking payload has the Telegram page link encoded with RC4 encryption. 

Upon execution, the banking payload will reach out to the Telegram page and download the content hosted on that page.

It’s been noticed that C2 domains are encoded in RC4 and stored within the code. The payload notifies C2 about every loaded application so that it can get further instructions.

In one instance, if a legitimate application is installed in the infected device, it will display the fake login page of a targeted banking application.

Malware uploading all package information to receive commands

Another program called “Expense Keeper” was also seen by ThreatLabz to be acting in a similar manner. When this application is executed, it is seen that the “Enabled parameter” is set to false. 

The Dropper URL for the banking payload could not be retrieved. For the same, ThreatLabz collaborates with the Google Security team.

Final Word

These bank phishing installers frequently rely on deceiving users into installing harmful programs.

Users are urged to pay attention to the applications that are installed. A Play Store app shouldn’t urge users to install it from untrusted sources or side-load it. Finally, user awareness is crucial to thwarting various phishing tactics.

Managed DDoS Attack Protection for Applications – Download Free Guide

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS...

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

ToxicPanda Banking Malware Attacking Banking Users To Steal Logins

Recent research has uncovered a new strain of malware developed for Android devices, initially...

ErrorFather Hackers Attacking & Control Android Device Remotely

The Cerberus Android banking trojan, which gained notoriety in 2019 for its ability to...