Security analysts at Zimperium have uncovered concerning developments in an ongoing Android mobile banking Trojan campaign aimed at major Iranian banks. Initially detected in July 2023, this campaign has not only persisted but has also evolved significantly, showcasing enhanced capabilities that pose a serious threat. According to a recent report by Zimperium’s malware analysts Aazim Bill SE Yaswant and Vishnu Pratapagiri, the campaign continues to thrive with newfound iterations and expanded reach. The investigation initially identified a series of credential-harvesting apps posing as prominent Iranian banks between December 2022 and May 2023.
These apps were designed to pilfer banking login credentials, credit card information, conceal app icons to evade detection, and intercept SMS messages for one-time passwords (OTPs). Zimperium’s latest findings, published recently, have unveiled 245 new app variants linked to the same threat actors. Alarmingly, 28 of these variants have managed to evade detection by conventional scanning tools, indicating a heightened level of sophistication in the malware’s design. These new iterations of the Trojan not only extend the campaign’s target list to additional banks but also reveal the threat actors’ intent to expand their reach further. Moreover, the malware now displays an interest in gathering data from various cryptocurrency wallet applications, hinting at potential future targets.
The researchers also noted an evolution in the Trojan’s capabilities, including the misuse of accessibility services for overlay attacks, automatic granting of SMS permissions, prevention of uninstallation, and data exfiltration via GitHub repositories. The report underscores vendor-specific attacks on Xiaomi and Samsung devices and even suggests a potential interest in targeting iOS devices. This escalation underscores the necessity for heightened vigilance and protection measures, particularly in the dynamic landscape of mobile application security.
Read more