Security researchers have unearthed a sophisticated iteration of the Vultur banking trojan targeting Android users, featuring heightened remote control capabilities and evasion strategies. Initially documented in March 2021, Vultur resurfaced on Google Play through dropper apps in late 2022, gaining notoriety as one of the top 10 most active banking trojans of 2023, targeting numerous banking apps across 15 countries. The latest variant employs a hybrid attack vector, leveraging smishing and phone calls to dupe victims into installing a fake version of the McAfee Security app, thus initiating a complex infection chain.
This new infection chain unfolds with victims receiving SMS messages alerting them of unauthorized transactions, prompting them to call a provided number for assistance. Fraudsters on the other end of the line coerce victims into clicking links received via subsequent SMS messages, leading to websites offering a modified McAfee Security app containing the ‘Brunhilda’ malware dropper. Once installed, the app executes multiple payloads, enabling access to Accessibility Services, initializing remote control systems, and establishing connections with command and control servers.
Beyond retaining features like screen recording and keylogging, the latest Vultur variant introduces enhancements such as file management actions, utilization of Accessibility Services for gestures, and app-blocking capabilities. Moreover, it employs advanced evasion techniques like encrypting communication and obfuscating malicious activities under legitimate app guises, challenging detection and analysis efforts. As the malware evolves rapidly with a focus on enhancing remote control functionalities, users are urged to exercise caution, stick to reputable app stores, and scrutinize app permissions to mitigate the risk of Android malware infections.