Article Details
Scrape Timestamp (UTC): 2024-08-05 04:58:40.664
Source: https://thehackernews.com/2024/08/new-android-trojan-blankbot-targets.html
Original Article Text
Click to Toggle View
New Android Trojan "BlankBot" Targets Turkish Users' Financial Data. Cybersecurity researchers have discovered a new Android banking trojan called BlankBot targeting Turkish users with an aim to steal financial information. "BlankBot features a range of malicious capabilities, which include customer injections, keylogging, screen recording and it communicates with a control server over a WebSocket connection," Intel 471 said in an analysis published last week. Discovered on July 24, 2024, BlankBot is said to be undergoing active development, with the malware abusing Android's accessibility services permissions to obtain full control over the infected devices. The names of some of the malicious APK files containing BlankBot are listed below - Like the recently resurfaced Mandrake Android trojan, BlankBot implements a session-based package installer to circumvent the restricted settings feature introduced in Android 13 to block sideloaded applications from directly requesting dangerous permissions. "The bot asks the victim to allow installing applications from the third-party sources, then it retrieves the Android package kit (APK) file stored inside the application assets directory with no encryption and proceeds with the package installation process," Intel 471 said. The malware comes with a wide range of features to perform screen recording, keylogging, and inject overlays based on specific commands received from a remote server to harvest bank account credentials, payment data, and even the pattern used to unlock the device. BlankBot is also capable of intercepting SMS messages, uninstalling arbitrary applications, and gathering data such as contact lists and installed apps. It further makes use of the accessibility services API to prevent the user from accessing device settings or launching antivirus apps. "BlankBot is a new Android banking trojan still under development, as evidenced by the multiple code variants observed in different applications," the cybersecurity company said. "Regardless, the malware can perform malicious actions once it infects an Android device." The disclosure comes as Google outlined the various steps it's taking to combat threat actors' use of cell-site simulators like Stingrays to inject SMS messages directly into Android phones, a fraud technique referred to as SMS Blaster fraud. "This method to inject messages entirely bypasses the carrier network, thus bypassing all the sophisticated network-based anti-spam and anti-fraud filters," Google said. "SMS Blasters expose a fake LTE or 5G network which executes a single function: downgrading the user's connection to a legacy 2G protocol." The mitigation measures include a user option to disable 2G at the modem level and turn off null ciphers, the latter of which is an essential configuration for a False Base Station in order to inject an SMS payload. Earlier this May, Google also said it's stepping up cellular security by alerting users if their cellular network connection is unencrypted and if criminals are using cell-site simulators to snoop on users or send them SMS-based fraud messages.
Daily Brief Summary
A new Android banking trojan named BlankBot has been discovered targeting financial data of users in Turkey.
BlankBot uses malicious capabilities including customer injections, keylogging, and screen recording, and communicates with a command and control server via WebSocket.
The trojan abuses Android's accessibility services to gain extensive control over the infected devices, allowing it to execute a variety of malicious actions.
Features of BlankBot include harvesting bank account credentials, intercepting SMS messages, uninstalling applications, and accessing contact lists and installed apps.
It utilizes a session-based package installer to bypass Android 13’s restrictions on sideloaded apps requesting dangerous permissions.
The malware is still under active development, with multiple code variants observed in different applications, suggesting ongoing refinement by its developers.
In parallel, Google is enhancing measures to counteract cell-site simulators and SMS Blaster fraud, implementing options to disable 2G connections and improve network security alerts for users.