Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Malware

BlankBot (Trojan) – Malware

February 10, 2025
Reading Time: 4 mins read
in Malware
BlankBot (Trojan) – Malware

BlankBot

Type of Malware

Trojan

Targeted Countries

Turkey

Date of initial activity

2024

Motivation

Financial Gain

Attack Vectors

Phishing

Targeted Systems

Android

Overview

In recent months, the cybersecurity landscape has witnessed the emergence of BlankBot, a sophisticated Android banking trojan that is making waves due to its diverse and dangerous capabilities. Discovered in July 2024 by Intel 471 Malware Intelligence researchers, BlankBot represents a significant threat to mobile device users, particularly targeting Turkish individuals based on early analysis of the malware’s communication patterns and application strings. Unlike traditional banking trojans, BlankBot employs advanced tactics to gain control over infected devices, making it a formidable tool in the hands of cybercriminals. Its functionality spans screen recording, keylogging, and remote control, all of which enable the malware to capture sensitive user data, including banking credentials, personal information, and messages, while remaining largely undetected by most antivirus software. BlankBot’s design is centered around exploitation of Android’s accessibility services, granting the malware full control over a compromised device. Once installed, the malware is able to secretly record screen activity, log keystrokes, and create malicious overlays that trick users into disclosing sensitive information. By using WebSocket connections, BlankBot communicates with remote servers to exfiltrate stolen data and receive commands from threat actors, further enhancing its ability to conduct on-device fraud and other malicious activities. Additionally, the malware demonstrates a high level of persistence and evasion techniques, including obfuscation of its code and suppression of the app icon to avoid detection. The trojan is still in active development, with various samples showing different levels of functionality and new features being introduced. These features include the ability to bypass Android’s security features, such as the restriction on installing applications from third-party sources, making it an even more insidious threat to Android users. This ongoing evolution suggests that BlankBot may continue to develop and adapt to evade detection, posing a long-term risk to users globally. As cybercriminals refine their tactics and tools, BlankBot highlights the growing sophistication of mobile malware and the need for constant vigilance in securing personal devices against emerging threats.

Targets

Individuals

How they operate

Upon installation, BlankBot uses Android’s accessibility services to gain elevated privileges. Accessibility services in Android are designed to help users with disabilities by enabling features like screen readers or automatic screen manipulation. However, cybercriminals have leveraged this functionality for malicious purposes, and BlankBot is no exception. By exploiting these services, BlankBot can monitor and manipulate the user’s device, enabling capabilities such as capturing screenshots, recording keystrokes, and displaying fake login screens to trick users into entering their credentials. The malware is also able to bypass certain Android security measures, which makes it more difficult to detect using traditional antivirus or anti-malware programs. One of the key features of BlankBot is its use of screen recording. This allows the malware to continuously monitor what the user is doing on their device, potentially capturing sensitive information, including login credentials, banking transactions, and personal conversations. Additionally, BlankBot logs all keystrokes, further increasing the threat by capturing passwords, PINs, and other private data that may be typed into applications or websites. The trojan can also create fake overlays on legitimate banking applications to harvest login details. These overlays mimic the appearance of real apps, making it harder for users to distinguish between the legitimate interface and the malicious one. BlankBot communicates with remote servers using WebSocket connections, a real-time messaging protocol that enables constant, low-latency communication. This connection allows the malware to receive commands from the attackers, such as instructions to steal credentials or perform fraudulent activities. It also enables the malware to exfiltrate stolen data back to the attackers in real-time. This constant connection to remote servers ensures that the malware remains under the control of the threat actors and can adapt to new commands or changes in the environment, enhancing its persistence and flexibility. The malware also employs techniques to avoid detection and ensure its persistence on the infected device. It often hides its icon from the app launcher, making it less visible to the user. Additionally, the malware obfuscates its code, which complicates reverse engineering efforts and helps evade detection by security software. By making the app icon invisible and obfuscating its internal workings, BlankBot ensures that even vigilant users may not easily spot its presence. In some cases, the malware may even attempt to prevent users from uninstalling it by locking the settings or using other anti-uninstall techniques. Furthermore, BlankBot shows signs of being an evolving threat, with various versions showing incremental improvements in its capabilities. Some variants of BlankBot have demonstrated the ability to bypass Android’s installation restrictions, enabling it to install malicious applications from third-party sources. These apps may provide additional malicious functionality or further extend the control that BlankBot has over the compromised device. By continually evolving, BlankBot makes it harder for researchers and cybersecurity professionals to stay ahead of the threat. In conclusion, BlankBot represents a significant leap forward in the complexity of Android banking malware. By leveraging Android’s accessibility services, exploiting obfuscation techniques, and maintaining real-time communication with remote servers, the malware can remain undetected while capturing a vast range of sensitive information. The increasing sophistication of such malware highlights the critical need for stronger security measures, both for Android users and the cybersecurity industry as a whole. As BlankBot continues to evolve, it serves as a reminder of the persistent and growing threat posed by mobile banking malware.

MITRE Tactics and Techniques

T1414: Clipboard Data – Writes data in the user’s clipboard when a specific command is received. T1417.001: Keylogging – Logs keystrokes using accessibility services. T1513: Screen Capture – Records screen content via MediaProjection and MediaRecorder APIs. T1636.003: Contact List – Collects and exfiltrates the device’s contact list. T1636.004: SMS Messages – Collects and exfiltrates SMS text from the device. T1417.002: GUI Input Capture – Creates overlays to steal payment card data and pattern locks.  
Reference: 
  • BlankBot – a new Android banking trojan with screen recording, keylogging and remote control capabilities
Tags: AndroidBlankBotCybersecurityMalwarePhishingTrojansTurkey
ADVERTISEMENT

Related Posts

Iranian Phishing Campaign (Scam) – Malware

Iranian Phishing Campaign (Scam) – Malware

March 2, 2025
Fake WalletConnect (Infostealer) – Malware

Fake WalletConnect (Infostealer) – Malware

March 2, 2025
SilentSelfie (Infostealer) – Malware

SilentSelfie (Infostealer) – Malware

March 2, 2025
Sniper Dz (Scam) – Malware

Sniper Dz (Scam) – Malware

March 2, 2025
TikTok Malware Scam (Trojan) – Malware

TikTok Malware Scam (Trojan) – Malware

March 2, 2025
Zombinder (Exploit Kit) – Malware

Zombinder (Exploit Kit) – Malware

March 2, 2025

Latest Alerts

Google Patches Chrome Account Takeover Bug

Horabot Malware Targets LatAm Via Phishing

HTTPBot DDoS Threat To Windows Systems

Microsoft Defender Bug Allows SYSTEM Access

Uncanny Automator Bug Risks WordPress Sites

Devs Hit By PyPI Solana Token Secret Theft

Subscribe to our newsletter

    Latest Incidents

    Dior Breach Exposes Asian Customer Data

    Australian Human Rights Body Files Leaked

    Nucor Cyberattack Halts Plants Networks

    Alabama Cybersecurity Event Hits Services

    Andy Frain Data Breach Impacts 100k People

    Hong Kong DSC Hit By Ransomware Attack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial