A new strain of Android malware, known as Ajina.Banker, has been identified as a significant threat to bank customers in Central Asia. Discovered by Group-IB in May 2024, this malware has been active since at least November 2023. It primarily targets financial data and bypasses two-factor authentication (2FA) by exploiting a network of Telegram channels. These channels, which masquerade as legitimate applications related to banking, payment systems, or government services, facilitate the spread of the malware under the guise of seemingly trustworthy software.
Ajina.Banker is distributed through a sophisticated operation that uses multiple Telegram accounts to disseminate malicious APK files. This distribution method is notably effective as it bypasses many security restrictions and automatic moderation systems. The malware’s spread is also enhanced by localized promotional tactics, such as giveaways and promotions tailored to regional interests. This approach has allowed the malware to infiltrate a wide array of devices across various countries, including Armenia, Azerbaijan, Kazakhstan, Pakistan, and Russia.
Once installed, Ajina.Banker establishes a connection with a remote server to request permissions for accessing SMS messages, phone number APIs, and cellular network information. This enables the malware to gather sensitive data, such as SIM card information and details from installed financial apps. Additionally, Ajina.Banker can serve phishing pages designed to collect banking credentials and can access call logs and contacts. It also utilizes Android’s accessibility services to prevent uninstallation and to grant itself further permissions.
The operation of Ajina.Banker reflects a high degree of automation and coordination, with threat actors using automated tools to distribute the malware and manage its operations. Despite Google’s assurance that the malware has not been distributed via the Google Play Store and that Google Play Protect offers some protection, the malware’s sophisticated distribution and evasion techniques highlight the need for heightened vigilance among Android users, particularly in regions targeted by this campaign.
Reference: