Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Rocinante Malware Hijacks Android Devices

August 30, 2024
Reading Time: 2 mins read
in Alerts
Rocinante Malware Hijacks Android Devices

The emergence of Rocinante, a new strain of banking malware, has raised significant concerns for the Brazilian financial sector. Discovered by cybersecurity researchers at ThreatFabric, Rocinante represents a sophisticated evolution of earlier banking trojans, designed to take full control of Android devices remotely. The malware exploits the Android Accessibility Service to perform keylogging, create deceptive phishing screens that imitate legitimate banking institutions, and steal personally identifiable information (PII). This multifaceted approach allows Rocinante to bypass traditional security measures and compromise sensitive user data.

Rocinante is distributed through phishing websites that disguise malicious APKs as critical security updates, courier applications, or banking software. Once installed, the malware takes control of the device’s accessibility features, enabling it to monitor user activity, simulate touches, swipes, and other interactions, and execute unauthorized transactions. This extensive control allows attackers to manipulate mobile banking operations and gain unauthorized access to financial accounts.

The malware’s communication methods include standard HTTP for initial setup, WebSockets for data transfer, and Firebase for device registration. These protocols facilitate seamless interaction with command-and-control (C2) servers, where stolen data is collected and analyzed. Rocinante also employs targeted phishing screeners designed to deceive users of specific Brazilian banks, enhancing its effectiveness in compromising financial information.

Rocinante’s advanced capabilities, which include integration of code from the leaked Ermac/Hook malware, highlight the evolving nature of financial cybercrime in Latin America. By combining PII theft, device control, and transaction manipulation, Rocinante poses a significant threat to Brazilian banking customers. As financial institutions face this new wave of malware, enhancing security measures and user awareness will be crucial in mitigating the risks associated with such sophisticated cyber threats.

Reference:

  • Rocinante Malware Targets Brazilian Banking Customers by Hijacking Android Devices
Tags: AndroidAugust 2024banking malwareBrazilian financial sectorCyber AlertsCyber Alerts 2024Cyber threatsMalwareRocinante
ADVERTISEMENT

Related Posts

Russian APT28 Deploys Outlook Backdoor

SAP S4hana Exploited Vulnerability

September 5, 2025
Russian APT28 Deploys Outlook Backdoor

Virustotal Finds Undetected SVG Files

September 5, 2025
Russian APT28 Deploys Outlook Backdoor

Russian APT28 Deploys Outlook Backdoor

September 5, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

Lazarus Hackers Exploit ZeroDay, Deploy Rats

September 4, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

CISA Flags TP Link Router Flaws

September 4, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

Google Patches 120 Flaws In Android

September 4, 2025

Latest Alerts

SAP S4hana Exploited Vulnerability

Virustotal Finds Undetected SVG Files

Russian APT28 Deploys Outlook Backdoor

CISA Flags TP Link Router Flaws

Lazarus Hackers Exploit ZeroDay, Deploy Rats

Google Patches 120 Flaws In Android

Subscribe to our newsletter

    Latest Incidents

    North Korean Hackers Fake Interviews

    Bridgestone Confirms Cyberattack

    Cybersecurity Firms Hit By Breach

    Salesloft Drift Attacks Hits Vendors

    Jaguar Land Rover Hit By Cyber Incident

    Hackers Use Grok Ai To Spread Malware

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial