Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Godfather Android Banking Trojan Targeting Over 400 Applications

The Godfather Android banking trojan has been observed targeting over 400 banking and crypto applications in 16 countries, threat intelligence firm Group-IB warns.

The Godfather Android banking trojan has been observed targeting over 400 banking and crypto applications in 16 countries, threat intelligence firm Group-IB warns.

Godfather was initially observed in June 2021 and is believed to be the successor of the Anubis banking trojan, likely built on top of the Anubis source code that leaked in 2019.

Compared to Anubis, Godfather features updated command-and-control (C&C) communication and implementation, a modified traffic encryption algorithm, a new module for managing virtual network computing (VNC) connections, and updated functionality such as Google Authenticator OTPs.

On the infected devices, the trojan uses web overlays (convincing fake HTML pages that are displayed on top of the legitimate applications) to steal login credentials, bypass two-factor authentication (2FA), and gain access to the victim’s account.

The malware can also record the device’s screen, create VNC connections, launch a keylogger, exfiltrate push notifications and SMS messages (to bypass 2FA), send SMS messages, forward calls, execute USSD requests, launch proxy servers, enable silent mode, and establish WebSocket connections.

Godfather is likely distributed via malicious downloader applications hosted on Google Play and can imitate Google Protect, but without providing the actual scanning functionality. The threat can also be distributed using the malware-as-a-service (MaaS) model, Group-IB says.

Advertisement. Scroll to continue reading.

After infection, the trojan achieves persistence on the device, creates a pinned notification, and hides its icon. It also requests access to the Accessibility service, which, once granted, allows it to issue itself the permissions it needs to operate unobstructed on the device.

The threat collects device information and sends it to its C&C server, including network operator name and country code, phone status, default device user agent, bot ID, installed applications, Android version, device model, and details on whether required permissions have been granted.

As of October 2022, Godfather has targeted users of 215 banks, 94 crypto wallets, and 110 crypto exchanges, Group-IB says. Most of the targeted banks are in the US (49), Turkey (31), and Spain (30), but the malware also targets banking applications in Canada (22), France (20), Germany (19), and the UK (17).

Godfather appears to be operated by Russian cybercriminals, as it stops its malicious routine if it detects a language used in the former Soviet Union countries, including Russia, Azerbaijan, Armenia, Belarus, Kazakhstan, Kyrgyzstan, Moldova, Tajikistan, and Uzbekistan.

Related: ‘MaliBot’ Android Malware Steals Financial, Personal Information

Related: Backdoors Found on Counterfeit Android Phones

Related: New ‘Ginp’ Android Trojan Targets Credentials, Payment Card Data

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.