The emergence of Rocinante, a new strain of banking malware, has raised significant concerns for the Brazilian financial sector. Discovered by cybersecurity researchers at ThreatFabric, Rocinante represents a sophisticated evolution of earlier banking trojans, designed to take full control of Android devices remotely. The malware exploits the Android Accessibility Service to perform keylogging, create deceptive phishing screens that imitate legitimate banking institutions, and steal personally identifiable information (PII). This multifaceted approach allows Rocinante to bypass traditional security measures and compromise sensitive user data.
Rocinante is distributed through phishing websites that disguise malicious APKs as critical security updates, courier applications, or banking software. Once installed, the malware takes control of the device’s accessibility features, enabling it to monitor user activity, simulate touches, swipes, and other interactions, and execute unauthorized transactions. This extensive control allows attackers to manipulate mobile banking operations and gain unauthorized access to financial accounts.
The malware’s communication methods include standard HTTP for initial setup, WebSockets for data transfer, and Firebase for device registration. These protocols facilitate seamless interaction with command-and-control (C2) servers, where stolen data is collected and analyzed. Rocinante also employs targeted phishing screeners designed to deceive users of specific Brazilian banks, enhancing its effectiveness in compromising financial information.
Rocinante’s advanced capabilities, which include integration of code from the leaked Ermac/Hook malware, highlight the evolving nature of financial cybercrime in Latin America. By combining PII theft, device control, and transaction manipulation, Rocinante poses a significant threat to Brazilian banking customers. As financial institutions face this new wave of malware, enhancing security measures and user awareness will be crucial in mitigating the risks associated with such sophisticated cyber threats.
Reference: