January 14, 2016 By Douglas Bonderud 2 min read

Android malware is off to a running start in 2016. According to the International Business Times, Google just removed 13 apps carrying the Brain Test malware from its Play store. More worrisome, two Trojan deployments — SlemBunk and Android.Bankosy — are now targeting financial apps used by millions of Android owners. Here’s a quick rundown.

Android Trojan Brings Organized Chaos

SecurityWeek reported that Android Trojan SlemBunk is part of a well-organized and still-evolving chain of malware attacks. Security firm FireEye first analyzed the Trojan in December 2015 and found that it targeted 33 banking apps from financial institutions across North America, Europe and Asia-Pacific. Apps infected with the malicious code are downloaded to user devices through both legitimate adult websites and malicious redirection, often disguised as reputable tools such as Adobe Flash Player.

While the malware is still in a state of flux, security researchers now know that it first triggers drive-by downloads to retrieve the SlemBunk dropper app. Next the dropper unpacks the logic required to recover and deploy a downloader, which in turn contacts the command-and-control (C&C) server to grab the final payload.

This longer-than-average chain of events makes it difficult to track origin servers. What’s more, the app lies in wait until a relevant banking process is initiated. Once detected, SlemBunk generates a customized phishing page that convinces users to hand over personal details.

Forward or Back?

One way to solve the problem of attacks like SlemBunk is two-factor authentication. Along with a username and password, banking customers must also enter a one-time code generated when they try to log in, which is sent to their mobile device via SMS. Not surprisingly, however, clever malware-makers discovered a way to intercept these SMS codes and still break the bank, leading some financial institutions to institute a voice-only policy with codes delivered via automated calling services.

According to PCWorld, however, the makers of mobile Trojan Android.Bankosy have also cracked this code and found a way to forward voice-delivered passcodes to a different telephone number. In the Asia-Pacific region, for example, the service code *21*[destination number]# is often used to forward calls.

By combining this code with malware designed to enable silent mode and keep users locked out of their phone during the bank’s passcode call, victims are unaware the two-factor process has been compromised. If malicious actors already have basic login credentials, it becomes a difficult task for users to convince banks they’ve been hacked because, by all accounts, security is working as intended.

The value of Android Trojan malware is on the rise as smartphones and tablets become go-to devices for financial transactions. Both long-chain attacks like SlemBunk and innovative hacks such as Android.Bankosy are looking for new ways to grab user data and leave no trace behind. This double dose of banking malware means users must apply caution in equal measure.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today