Android malware authors targeting more than banking apps now.

File:Android Lollipop statue.jpg - Wikimedia Commons

Cyber security researchers, Threat Fabric, have announced that over 300 non-financial applications are being targeted by the Black Rock trojan. Black Rock is derived from the code of the Xerxes banking malware, with a wider target pool. The malware aims to steal data and credentials from social networking, dating and cryptocurrency apps.

When installed the malware first asks the users for permission to 'Observe your actions' and 'Retrieve window content'; in fact it is seeking to gain the following permissions:

Command

Description

Send_SMSSends an SMS
Flood_SMSSends an SMS to a specific number every 5 seconds
Download_SMSSends a copy of SMS messages to C2
Spam_on_contactsSends an SMS to each of the contacts present on the infected device
Change_SMS_ManagerSet malware as default SMS manager (command is repeated every 30 seconds until action is achieved)
Run_AppStarts a specific app on the bot
StartKeyLogsLogs text content shown on the screen from targets and sends it to the C2
StopKeyLogsStops logging the accessibility events from targets
StartPushSend a copy of all notifications content to the C2
StopPushStops sending a copy of all notifications content to the C2
Hide_Screen_LockKeeps the device on the HOME screen
Unlock_Hide_ScreenUnlocks the device from the HOME screen
AdminMakes the both request admin privileges
ProfileAdds a managed admin profile for the malware on the device
Start_clean_PushDismisses (hiding) all push notifications
Stop_clean_PushStops dismissing push notifications

BlackRock embeds following set of features, allowing it to remain under the radar and successfully harvest personal information:

  • Overlaying: Dynamic (Local injects obtained from C2)
  • Keylogging
  • SMS harvesting: SMS listing
  • SMS harvesting: SMS forwarding
  • Device info collection
  • SMS: Sending
  • Remote actions: Screen-locking
  • Self-protection: Hiding the App icon
  • Self-protection: Preventing removal
  • Notifications collection
  • Grant permissions
  • AV detection
Threat fabric summarises by saying:
"we can expect that financially motivated threat actors will build new banking Trojans and continue improving the existing ones. With the changes that we expect to be made to mobile banking Trojans, the line between banking malware and spyware becomes thinner, banking malware will pose a threat for more organizations and their infrastructure"

Comments

Popular Posts