BankBot: Banking malware the Dutch security provider Securify takes hundreds of finance apps in the sight of

play discovered in Google’s apps marketplace a banking malware for Android . This is a variant of the Trojan BankBot the in the app funny videos hidden 2017. Google has now removes the application from its offer.

 app-malware (image: Shutterstock) “apparently the app has been updated recently (on 8 April 2017) and then the malware was probably added,”writes security researcher Niels Croese in the Securify blog . The app got between 1000 and 5000 installations, which is plenty for a malware and especially when compared to other previously discovered banking Trojans.

the more detailed analysis of the malware also revealed a special feature. A list of around 400 legitimate banking apps, which apparently took the backers of BankBot target to infect them with malicious code found in the code. Among them are also the apps by numerous financial institutions in Switzerland, Austria and Germany, as well as in the Netherlands, Ireland, United Kingdom, Turkey, France, Italy and Poland. But also financial apps from third-party providers such as PayPal and star financial are among the targets of hackers.

“To our surprise, the list was much larger than expected”, added the security researcher. “After a period of quiet and the game started again. So far I have no reason to assume that the functionality of the malware differs significantly from previous versions, but I have to see more precisely that.”

specifically the malicious app trying to spy out access data for online banking. For this, she displays a fake login pages of previously infected banking apps. Before that, however a user must grant the required privileged. Then the Trojan can also send SMS and receive, obtain Administrator rights, determine the location of said list with to attacking banking applications.

despite strict controls on the part of Google happens time and again that security researchers discover malicious programs in the play store. Skinner malware remained undetected last even two months. Check point had also made carefully in March on pre-installed malware . Were affected by Samsung LG, ASUS, oppo, ZTE, and Lenovo .

HIGHLIGHT

open Telecom cloud: resources on demand

from Capex to Opex: turn companies just reinforced rigid investment costs in dynamic editions, which adapt to the business – IT capacity from the cloud, rather than from their own servers and be so flexible. Popularity: Infrastructure-as-a-service (IaaS) from the open Telecom cloud.

tip : what do you know about mobile apps? Check your knowledge – with 15 questions on silicon.de.

Be the first to comment

Leave a Reply