Researchers Find Baby Banking Trojan, Watch It Grow

  /     /     /  
Publicated : 23/11/2024   Category : security


Researchers Find Baby Banking Trojan, Watch It Grow


EventBot is an Android information stealer on its way to becoming a very capable piece of malware.



Asaf Dahan, senior director at Cybereason, is trying to explain what happened.
My team and I were monitoring the threat landscape across different regions, industries, and technologies. We were chasing a lead on different malware and went down a rabbit hole. And when you go down a rabbit hole, you can become distracted, he says.
The distraction at the bottom of the rabbit hole turned out to be EventBot, a banking Trojan being built in real time as the team watched.
Dahan is in charge of the Cybereason Nocturnus research team. What he and his team found in March was a new type of Android malware that targets users of more than 200 different financial applications and is getting better on an almost-daily basis.
It was very interesting because it looked like it was still under development — version zero-dot-something. We saw a banking Trojan in the making, Dahan says.
In a
blog post
 about its research, the Nocturnus team says EventBot abuses Androids accessibility features to steal user data from financial applications, read user SMS messages, and steal SMS messages to allow the malware to bypass two-factor authentication. The team has watched as the developer (or developers) of EventBot has improved it step by step across a couple of months, Dahan says.
We saw that whoever is behind it was uploading and trying to test detection, and every few days we got new samples from VirusTotal and other sources. Every few days the threat actor would update the code with new features, new obfuscation, and new tools, he explains.
While EventBot is becoming more capable, it has not yet been fully operationalized, Dahan says. It has not yet appeared on Google Play or another legitimate Android app store; Dahan hopes that by identifying the malware now, it will be prevented from taking hold on a major app store.
Indeed, prevention will be critical, Dahan says, because without it he sees the potential for EventBot to become a major banking Trojan and info stealer, on a par with the
Raccoon stealer
that was a major piece of Android malware in 2019. The Nocturnus team has already found a number of legitimate application icons associated with EventBot — icons that the malware could use to hide its true identity from victims.
While the researchers have watched EventBot grow, theres still a great deal they dont know about the malware — such as the identity of the developer.
We havent seen significant code overlap with previous actors, so its likely to have been written from scratch, Dahan says. It could be a new threat actor or someone existing who decided to try new malware. I dont think theyre super-experienced, but theyre not novice — theyre somewhere in between.
Theres also not enough information to know precisely how EventBot will be used in attacks, whether by the developer as proprietary code or in a malware-as-a-service leasing scheme.
This could be both — it depends on the size of the operation and the connections the threat actor has, Dahan says. The criminal cyber ecosystem is vast and complicated, and reputation and trust are your strongest currencies.
Dahan says his team will be watching EventBot as it continues to develop, but he does have advice on protection for potential victims.
This is an Android threat, not iOS. We havent seen the malware on Google Play, so its most likely in the first stages to be available in the rogue stores or dubious sites offering free cracked apps, Dahan says, pointing out that these dubious sites are the sources of a large percentage of the malware found on Android devices. Individuals should not get their apps from any site not created and maintained by a legitimate business, he advises.
[Next], in order for this to work it requires the user to authorize or give permission for the accessibility features, Dahan says. Users should apply critical thinking to any app requests for access to microphones, cameras, cloud accounts, or other data sources.
If the app is requesting permission it doesnt really need, dont click yes, he says. Even legitimate apps that harvest a lot of data and turn us into the product should be watched. Be very mindful of the permissions the app is asking you for.
Related Content:
5-Year-Long Cyber Espionage Campaign Hid in Google Play
Man-in-the-Middle Attacks: A Growing but Preventable Mobile Threat
More Attackers Have Begun Using Zero-Day Exploits
3 Mobile Security Problems That Most Security Teams Havent Fixed Yet
State of Cybersecurity Incident Response
How Enterprises Are Developing and Maintaining Secure Applications
A listing of 
free products and services
 compiled for Dark Reading by Omdia analysts to help meet the challenges of COVID-19. 
Check out
The Edge
, Dark Readings new section for features, threat data, and in-depth perspectives. Todays featured story:
Election Security in the Age of Social Distancing
.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Researchers Find Baby Banking Trojan, Watch It Grow