Trending

#bankingmalware

Latest posts tagged with #bankingmalware on Bluesky

Latest Top
Trending

Posts tagged #bankingmalware

Preview
Screen Sharing on WhatsApp Turns Costly with Major Financial Loss   Several disturbing patterns of digital deception have quietly developed in recent months, revealing just how readily everyday communications tools can be turned into instruments of financial ruin in an instant. According to security researchers, there has been an increase in sophisticated cybercriminal schemes utilizing the trust users place in familiar platforms, particularly WhatsApp, to gain access to the internet.  It is a common occurrence that what initially starts out as a friendly message, an unexpected image, or a polite call claiming that an “urgent issue” with a bank account is a crafted scam which soon unravels into a meticulously crafted scam. It is very possible for malicious software to be installed through downloading an innocuous-looking picture that can allow you to infiltrate banking applications, harvest passwords, and expose personal identification information without your knowledge.  There have been instances where fraudsters impersonating bank representatives have coaxed users into sharing their screens with the false pretense that they are resolving account discrepancy. When this has happened, these fraudsters can observe every detail in real time - OTP codes, login credentials, account balances - and in some cases, they will convince victims to install remote access programs or screen mirroring programs so they can further control the device.  It is evident from the intertwined tactics that a troubling trend in digital crime has taken place, emphasizing the need for increased vigilance among Indians and beyond, underscoring a troubling development. There is a fast-growing network of social-engineering groups operating across multiple regions, who are utilizing WhatsApp's screen-sharing capabilities to bypass safety measures and gain control of their financial lives by manipulating their screen-sharing capabilities.  Investigators have begun piecing together the contours of this network. Initially introduced in 2023 as a convenience feature, screen-sharing has since become a critical point of exploitation for fraudsters who place unsolicited video calls, pretend to be bank officials or service providers, and convince victims to reveal their screens, or install remote-access applications masquerading as diagnostic tools, to exploit their vulnerabilities.  Almost $700,000 was defrauded by one victim in one of the cases of abuse that spanned from India and the U.K. to Brazil and Hong Kong. This demonstrates how swiftly and precisely these schemes emerge. In describing the technique, it is noted that it is not based on sophisticated malware, but rather on urgency, trust, and psychological manipulation, allowing scammers to circumvent a lot of traditional technical protections.  Furthermore, criminal networks are enhancing their arsenals by spreading malicious files via WhatsApp Web, including one Brazilian operation that uses self-replicating payloads to hijack contacts, automate fraudulent outreach, and compromise online banking credentials through its use of malicious payloads distributed through WhatsApp Web.  The investigators of the fraud note that the mechanisms are based less on technical sophistication and more on psychological pressure intended to disarm victims. An unsolicited WhatsApp video call made by a number that appears local can be the start of the scam, usually presented as a bank officer, customer service agent, or even an acquaintance in need of assistance.  Callers claim to have an urgent problem to solve - an unauthorized transaction, an account suspension threat, or even an error in the verification process - that creates a feeling of panic that encourages their victims to comply without hesitation. The imposter will initially convince the victim that the issue is being resolved, thereby leading to them sharing their screen or installing a legitimate remote-access application, such as AnyDesk or TeamViewer, which will enable the fraudster to watch every action that occurs on the screen in real time, as they pretend to resolve it.  By using this live feed, an attacker can access one-time passwords, authentication prompts, banking app interfaces, as well as other sensitive credentials. By doing so, attackers can be able to take control of WhatsApp accounts, initiate unauthorized transfers, or coax the victim into carrying out these actions on their own. A more elaborate variant consists of guiding the victim into downloading applications that secretly contain keyloggers or spyware that can collect passwords and financial information long after the call has ended, allowing them to collect it all. When scammers have access to personal information such as banking details or social media profiles, they can drain accounts, take over accounts on social networks, and assume the identity of victims to target others on their contact list. Authorities caution that the success of these schemes depends on trust exploiting, so user vigilance is key. According to the advisories, individuals should be cautious when receiving unknown phone calls, avoid sharing screens with unknown parties, disable installations coming from untrusted sources, and refrain from opening financial apps when they are receiving remote access.  These measures are crucial in order to prevent these social engineering scams from getting the better of them, as they continue to develop. As far as the most advanced variations of the scam are concerned, the most sophisticated versions of the scam entail criminals installing malicious software through deceptive links or media files in a victim's device, thus granting them complete control of that victim's computer.  When these kinds of malware are installed, they can record keystrokes, capture screens, gather banking credentials, intercept two-factor authentication codes, and even gain access to sensitive identity documents. It is possible for attackers to take control of cameras and microphones remotely, which allows them to utilize the device as a tool for surveillance, coercion, or a long-term digital impersonation device.  In addition to financial theft, the extent to which the compromised identity may be exploited goes far beyond immediate financial exploitation, often enabling blackmail and continuous abuse of the victim's identity.  In light of this backdrop, cybersecurity agencies emphasize the significance of adopting preventative habits that can significantly reduce exposure to cybercriminals. There is still an important role to play in ensuring that users do not download unfamiliar media, disable WhatsApp's automatic download feature, and keep reputable mobile security tools up to date.  WhatsApp still has the built-in features that allow them to block and report suspicious contacts, while officials urge individuals to spread basic cyber-hygiene knowledge among their communities, pointing out that many people fall victim to cyber-attacks simply because they lack awareness of the dangers that lurk.  There has been a surge of fraud attempts across messaging platforms, and Indian authorities, including the Indian Cybercrime Coordination Centre, as well as various state cyber cells have issued a number of public advisories about this, and citizens are encouraged to report such attacks to the National Cybercrime Reporting Portal as soon as possible.  In conjunction with these warnings, these findings shed light on a broader point: even the most ordinary digital interactions are capable of masking sophisticated threats, and sustained vigilance remains the strongest defense against the growing epidemic of social engineering and malware-driven crimes that are booming in modern society.  As the majority of the fraud is carried out by social-engineering tactics, researchers have also observed a parallel wave of malware campaigns that are utilizing WhatsApp's broader ecosystem, which demonstrates how WhatsApp is capable of serving as a powerful channel for large-scale infection. As an example of self-replicating chains delivered through WhatsApp Web, one of the most striking cases was reported by analysts in Brazil.  A ZIP archive was sent to the victims, which when opened, triggered the obfuscated VBS installer SORVEPOTEL, which was an obfuscated VBS installer. In this PowerShell routine, the malware used ChromeDriver and Selenium to re-enter the victim's active WhatsApp Web session, enabling the malware to take full control of the victim's active WhatsApp Web session.  In order to spread the malware, the script retrieved message templates from a command-and-control server, exfiltrated the user's contact list, and automatically distributed the same malicious ZIP file to every network member that was connected with it—often while displaying a fake banner that said "WhatsApp Automation v6.0" to give it the appearance of legitimacy.  Researchers found that Maverick was a payload that was evasive and highly targeted, and it was also accompanied by a suite of malicious capabilities. It was also packaged inside the ZIP with a Windows LNK file that could execute additional code through the use of a remote server that had the first stage loader on it. As soon as the malware discovered that the device was belonging to a Brazilian user, it launched its banking module only after checking for debugging tools, examining the system locale indicators such as the time zone and language settings.  A Maverick server monitoring website activity for URLs linked to Latin American financial institutions, when activated, was aligned with credential harvesting and account manipulation against regional banks, aligning its behavior with credential harvesting. As Trend Micro pointed out previously, an account ban could be issued as a result of the sheer volume of outbound messages caused by a similar WhatsApp Web abuse vector, which relied on active sessions to mass-distribute infected ZIP files.  These malware infections acted primarily as infostealers that targeted Brazilian banking and cryptocurrency platforms, thereby demonstrating the fact that financial fraud objectives can be easily mapped to WhatsApp-based lures when it comes to financial fraud.  It is important to note, however, that security analysts emphasize that the global screen-sharing scams are not primarily the work of a single sophisticated actor, but rather the work of a diffuse criminal ecosystem that combines trust, urgency, and social manipulation to make them successful. According to ESET researchers, these tactics are fundamentally human-driven rather than based on technical exploits over a long period of time, whereas Brazilian malware operations show clearer signs of being involved in structured criminal activity.  It is thought that the Maverick Trojan can be linked to the group that has been named Water Saci, whose operations overlap with those of the Coyote banking malware family-which indicates that these groups have been sharing techniques and developing tools within Brazil's underground cybercrime market.  Even though the associations that have been drawn between WhatsApp and opportunistic scammers still seem to be rooted in moderate confidence, they reveal an evolving threat landscape in which both opportunistic scammers and organized cybercriminals work towards exploiting WhatsApp to their advantage.  A number of analysts have indicated that the success of the scheme is a function of a carefully orchestrated combination of trust, urgency, and control. By presenting themselves as legitimate entities through video calls that appear to originate from banks, service providers, or other reliable entities, scammers achieve a veneer of legitimacy by appearing authentic. In addition, they will fabricate a crisis – a fake transaction, a compromised account, or a suspended service – in order to pressure the victim into making a hasty decision. The last step is perhaps the most consequential: convincing the victim to share their screen with the attacker, or installing a remote access tool, which in effect grants the attacker complete access to the device.  In the event that a phone is gained access to, then every action, notification, and security prompt becomes visible, revealing the phone as an open book that needs to be monitored. Security professionals indicate that preventative measures depend more on vigilance and personal precautions than on technical measures alone.  Unsolicited calls should be treated with suspicion, particularly those requesting sensitive information or screen access, as soon as they are received, and any alarming claims should be independently verified through official channels before responding to anything unfounded. The use of passwords, OTPs, and banking information should never be disclosed over the telephone or through email, as legitimate institutions would not request such data in this manner.  Installing remote access apps at the direction of unfamiliar callers should be avoided at all costs, given that remote access applications allow you to control your device completely. It is also recommended to enable WhatsApp's built-in two-step verification feature, which increases the security level even in the event of compromised credentials. Finally, investigators emphasize that a healthy degree of skepticism remains the most effective defense; if we just pause and check it out independently, we may be able to prevent the cascading damage that these highly persuasive scams intend to cause us.

Screen Sharing on WhatsApp Turns Costly with Major Financial Loss #BankingMalware #CyberAttacks #CybercrimeTrends

0 0 0 0
Post image Post image Post image

Bösartige Apps im Google-Play-Store infiltrieren IoT- und OT-Systeme

#AppSecurity #BankingMalware #Cybersecurity #Cybersicherheit #Fertigungssektor #GooglePlayStore #IoT #IoTMalware #OTSecurity #Spionage @Zscaler @Zscaler_DACH

netzpalaver.de/2025/...

0 0 0 0
Post image

Alert: A new WhatsApp worm is targeting Brazilian users, spreading banking malware via malicious ZIP files. Stay cautious and avoid opening unknown attachments. #CyberSecurity #WhatsAppWorm #BankingMalware Link: thedailytechfeed.com/whatsapp-wor...

0 0 0 0
Preview
GodFather Malware | The Virtual App Deception You Won't See Coming GodFather Malware: The Virtual App Deception You Won't See Coming Episode Notes: GodFather Malware's Stealthy Installation & Virtualization Attack In this episode of "Upwardly Mobile," we dive deep into the sophisticated threat posed by the GodFather Android malware, a dangerous new version that's hijacking legitimate mobile applications, especially banking and cryptocurrency apps, by turning your own device into a spy. We'll uncover its deceptive installation methods and its advanced on-device virtualization technique that makes it nearly impossible to detect visually. How GodFather Malware Gets Installed: Beyond the Play Store The GodFather malware doesn't come from the official Google Play Store. Instead, it gets installed through a highly deceptive process that begins with users downloading malicious applications from phishing sites. This is a prime example of sideloading – installing apps from unofficial channels. Here’s a breakdown of its cunning installation tactics: - Initial Access via Phishing: Adversaries host phishing sites where users are lured into downloading these malicious applications. - Deceptive Installation Technique: The malware uses a session-based installation technique to deploy its actual payload, specifically designed to bypass accessibility permission restrictions. - Luring Victims with False Promises: During installation, it presents a message stating, "You need to grant permission to use all the features of the application." This is a calculated tactic to trick users into unknowingly installing the malware. - Hidden Payload and Permission Escalation: The core malicious payload is concealed within the assets folder of the deceptive application. Once a victim falls for the trick and grants initial accessibility permissions, GodFather can then covertly grant itself additional permissions by overlaying content on the screen, all without the user's awareness or consent. - Masquerading: To avoid detection, the malware often masquerades as a genuine Music application. The Virtualization Trick: Running Real Apps in a Sandbox Forget fake login screens – GodFather's new upgrade leverages on-device virtualization. Instead of just showing a deceptive image, the malware installs a hidden "host app" that runs a real copy of your banking or crypto app inside its own controlled sandbox. When you try to open your actual app, the malware seamlessly redirects you to this virtual version. This technique offers significant advantages to attackers: - Real-Time Monitoring and Control: The malware monitors and controls every action, tap, and word you type in real time, making it nearly impossible to notice anything amiss since you're interacting with the actual app. - Data Theft and Account Takeover: This allows attackers to steal usernames, passwords, and device PINs, ultimately gaining complete control of your accounts. It can intercept sensitive data as you enter it and even modify app behavior to bypass security checks like root detection. - Mimicking & Interception: GodFather first scans for apps on your device, compares them against a list of targeted apps (which numbers nearly 500 globally). If a targeted app is found, it creates a virtualized version. It can also steal device lock credentials (PIN, pattern, password) using deceptive overlays. - Remote Control: The malware can even remotely control an infected device using various commands, allowing hackers to commit real-time fraud without your knowledge. Evasive Maneuvers and Global Targets While GodFather employs its advanced virtualization, it also continues to use traditional overlay attacks. It has a broad reach, targeting 484 applications globally, including major global services for payments, e-commerce, social media, communication, and a vast array of cryptocurrency exchanges and wallets. The highly sophisticated virtualization attack is currently focused on 12 specific Turkish financial institutions. The malware uses clever tricks to avoid detection, such as tampering with APK file structures to make them appear encrypted, adding misleading information, and shifting harmful code to the Java layer. It also hides critical information, like its command and control (C2) server details, in an encoded form. Protecting Yourself from Advanced Mobile Malware While this upgraded version of GodFather has primarily targeted Turkish Android users so far, the threat could easily expand globally. Here are essential steps to protect your Android smartphone and financial data: - Disable Unknown Sources: The easiest way to stop GodFather and similar malware is to turn off your Android smartphone's ability to install apps from unknown sources. This feature is disabled by default, but if you've enabled it, turn it off immediately. - Be Wary of Downloads: Exercise caution with files sent via email or social media, as they can contain malware. - Enable Google Play Protect: Ensure Google Play Protect is enabled on your smartphone, as it can scan existing and new apps for malware. Consider an Android antivirus app for additional protection. - Limit App Installations: Reduce your risk by limiting the number of apps installed on your phone. Delete unused apps and question whether you truly need a new app before installing it. - Keep Your OS Updated: Always update your Android smartphone as soon as new software becomes available. These updates often include critical security patches. How Approov Can Help Companies like Approov offer robust defenses against such sophisticated threats. Approov already has detections for protected apps running inside cloner apps, which share similarities with GodFather's virtualization technique. App attestation combined with RASP (Runtime Application Self-Protection) defenses can be used to defend against these attacks. While the "cat and mouse" game continues, solutions like Approov aim to detect when protected apps are run in compromised environments, helping to safeguard sensitive data. For more information on how to protect your mobile apps and APIs, visit our sponsor: approov.io Keywords: GodFather malware, Android malware, mobile banking security, cryptocurrency app security, virtualization attack, sideloading, phishing, mobile security, app attestation, RASP, Google Play Protect, cybercrime, data theft, credential stealing, cloner app, Android security, Zimperium, Approov, mobile app hijacking, advanced persistent threat. 

📣 New Podcast! "GodFather Malware | The Virtual App Deception You Won't See Coming" on @Spreaker #androidsecurity #approov #appsecurity #bankingmalware #cryptosecurity #godfathermalware #mobileapps #mobiledefense #sideloading #virtualizationattack #zimperium

0 0 0 0
Post image

We’re pleased to welcome Hugo Gonzalez to #Honeynet2025 in Prague, where he’ll take us deep into Mispadu, a Malware-as-a-Service platform actively targeting Mexico and other Latin American countries.

📍 June 2–4, 2025
🎟️ Limited tickets!
🔗 Register: prague2025.honeynet.org

#BankingMalware #Mispadu

1 1 0 0
Preview
Nederland in de top 5 van meest getroffen landen door mobiele malware / Malware / Cybercrime | CyberCrimelnfo.nl | De bibliotheek van Cybercrime en Darkweb Nederland behoort tot de top 5 van landen die het meest worden getroffen door mobiele malware. Leer over soorten malware, hun impact, en hoe je jezelf kunt beschermen.

#Nederland behoort tot de #top5 van landen die het meest worden getroffen door #mobielemalware, met een toenemende dreiging van #bankingmalware, #spyware, #ransomware en #phishingapps.
www.ccinfo.nl/cybercrime/m...

0 0 0 0
Preview
Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack A spear-phishing campaign in Brazil uses fake tax files to deliver Astaroth malware, impacting key industries.

Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack
thehackernews.com/2024/10/asta...
#Infosec #Security #Cybersecurity #CeptBiro #Astaroth #BankingMalware #Brazil #SpearPhishingAttack

0 0 0 0