Colin Mc Hugo

0 %
Colin Mc Hugo
Security Engineer Manager & CEO at Quantum Infinite Solutions Group Ltd.
  • Residence:
    Dublin
  • County:
    Dublin
  • Country:
    Ireland
Cyber Security Incident Response
Management & Architecture of Cyber Security Teams
Solutions & Coaching
  • Cyber Security Incident Response
  • Management & Architecture of Cyber Security Teams
  • Solutions
  • Training & Coaching

New Android Banking Trojan Emerges With Growing Capabilities

September 10, 2021

A mixture of banking functions, cryptocurrency wallets, and purchasing apps from the U.S. and Spain are the goal of a newly found Android trojan that would allow attackers to siphon personally identifiable data from contaminated gadgets, together with banking credentials and open the door for on-device fraud.

Dubbed S.O.V.A. (referring to the Russian phrase for owl), the present model of the banking malware comes with myriad options to steal credentials and session cookies by net overlay assaults, log keystrokes, conceal notifications, and manipulate the clipboard to insert modified cryptocurrency pockets addresses, with future plans to include on-device fraud through VNC, perform DDoS assaults, deploy ransomware, and even intercept two-factor authentication codes.

The malware was found at first of August 2021 by researchers from Amsterdam-based cybersecurity agency ThreatFabric.

Overlay assaults usually contain the theft of confidential person data utilizing malware that overlays its personal home windows on high of one other program. However, the pilfering of legitimate session cookies is especially nasty because it permits the criminals to log in and take over accounts from the customers with out the necessity for understanding the banking credentials.

“The second set of options, added sooner or later developments, are very superior and would push S.O.V.A. into a special realm for Android malware, making it doubtlessly some of the superior bots in circulation, combining banking malware with automation and botnet capabilities,” ThreatFabric said in a report shared with The Hacker Information.

Though the malware is believed to be in its nascent levels of improvement, S.O.V.A.’s builders have been promoting the product on hacking boards, trying to recruit testers to trial the malware on numerous gadgets and its bot capabilities. “Not redistribution of Cerberus/Anubis, the bot is written from scratch,” the discussion board submit learn.

“[S.O.V.A.] remains to be a challenge in its infancy, and now offers the identical primary options as most different trendy Android banking malware,” the researchers mentioned. “Nevertheless, the writer behind this bot clearly has excessive expectations for his product, and that is demonstrated by the writer’s dedication to check S.O.V.A. with third events, in addition to by S.O.V.A.’s specific function roadmap.”

Posted in SecurityTags:
Write a comment