Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Malware Now Targeting Banking Applications on Android, Says Trusteer

Researchers at Trusteer have discovered a type of attack that is targeting Android users via their desktops, with the aim of controlling both endpoint devices. So far the malware itself is limited to Spain, Germany, the Netherlands, and Portugal.

Trusteer’s discovery offers some additional insight into the development of SpyEye and Tatanga, the families of malware making headlines recently. In May, Trusteer observed Tatanga mixing traditional social engineering with browser hijacking in an attempt to fool the victim into legitimately approving wire transfers.

Researchers at Trusteer have discovered a type of attack that is targeting Android users via their desktops, with the aim of controlling both endpoint devices. So far the malware itself is limited to Spain, Germany, the Netherlands, and Portugal.

Trusteer’s discovery offers some additional insight into the development of SpyEye and Tatanga, the families of malware making headlines recently. In May, Trusteer observed Tatanga mixing traditional social engineering with browser hijacking in an attempt to fool the victim into legitimately approving wire transfers.

This time, Tatanga is combined with elements form SpyEye and used in a clever scheme to entice users to install an alleged security application. Based on what Trusteer has published, it appears that this latest set of attacks are an upgrade and not a new infection point. Once an infected system visits a specialized or pre-determined domain (often banking related), Tatanga will use web injects to entice the user to install the security application.

SPITMO Android Malware

“In most attacks, if the victim is using an operating system other than Android the malware informs the user that no further action is required. However, for all Android users, the desktop component [of the attack] requests the victim’s phone number and notifies them that a link for downloading the security application has been sent (via SMS) to their mobile device. The user is directed to install the fake application from this link and enter the activation code provided by the malware,” Trusteer explains.

If the attack is successful, the malware captures all SMS traffic, including any security codes that may be sent to the device.

The full blog post is here, which explains how the attacks work to some degree in each of the targeted areas. They’re all the same for the most part, but each one hammers home an important point; don’t download financial applications from unknown sources.

If the bank’s Web site is encouraging the use of a mobile security application – seemingly out of the blue – question them about it. It takes no time at all to initiate a phone call to the local branch.

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

Asus patched nine WiFi router security defects, including a highly critical 2018 vulnerability that exposes users to code execution attacks.