Article Details
Scrape Timestamp (UTC): 2024-11-05 12:18:15.019
Source: https://thehackernews.com/2024/11/new-android-banking-malware-toxicpanda.html
Original Article Text
Click to Toggle View
New Android Banking Malware 'ToxicPanda' Targets Users with Fraudulent Money Transfers. Over 1,500 Android devices have been infected by a new strain of Android banking malware called ToxicPanda that allows threat actors to conduct fraudulent banking transactions. "ToxicPanda's main goal is to initiate money transfers from compromised devices via account takeover (ATO) using a well-known technique called on-device fraud (ODF)," Cleafy researchers Michele Roviello, Alessandro Strino, and Federico Valentini said in a Monday analysis. "It aims to bypass bank countermeasures used to enforce users' identity verification and authentication, combined with behavioral detection techniques applied by banks to identify suspicious money transfers." ToxicPanda is believed to be the work of a Chinese-speaking threat actor, with the malware sharing foundational similarities with another Android malware dubbed TgToxic, which can steal credentials and funds from crypto wallets. TgToxic was documented by Trend Micro in early 2023. A majority of the compromises have been reported in Italy (56.8%), followed by Portugal (18.7%), Hong Kong (4.6%), Spain (3.9%), and Peru (3.4%), marking a rare instance of a Chinese threat actor orchestrating a fraudulent scheme to target retail banking users in Europe and Latin America. The banking trojan also appears to be in its nascent stages. Analysis shows that it's a stripped-down version of its ancestor, removing Automatic Transfer System (ATS), Easyclick, and obfuscation routines, while also introducing 33 new commands of its own to harvest a wide range of data. In addition, as many as 61 commands have been found to be common to both TgToxic and ToxicPanda, indicating that the same threat actor or their close affiliates are behind the new malware family. "While it shares some bot command similarities with the TgToxic family, the code diverges considerably from its original source," the researchers said. "Many capabilities characteristic of TgToxic are notably absent, and some commands appear as placeholders without real implementation." The malware masquerades as popular apps like Google Chrome, Visa, and 99 Speedmart, and is distributed via counterfeit pages mimicking app store listing pages. It's currently not known how these links are propagated and if they involve malvertising or smishing techniques. Once installed via sideloading, ToxicPanda abuses Android's accessibility services to gain elevated permissions, manipulate user inputs, and capture data from other apps. It can also intercept one-time passwords (OTPs) sent via SMS or generated using authenticator apps, thus enabling the threat actors to bypass two-factor authentication (2FA) protections and complete fraudulent transactions. The core functionality of the malware, besides its ability to harvest information, is to permit attackers to remotely control the compromised device and perform what's called ODF, which makes it possible to initiate unauthorized money transfers without the victim's knowledge. Cleafy said it was able to gain access to ToxicPanda's command-and-control (C2) panel, a graphical interface presented in Chinese that allows the operators to view the list of victim devices, including the model information, and location, and remove them from the bonnet. Furthermore, the panel serves as a conduit to request real-time remote access to any of the devices for conducting ODF. "ToxicPanda needs to demonstrate more advanced and unique capabilities that would complicate its analysis," the researchers said. "However, artifacts such as logging information, dead code, and debugging files suggest that the malware may either be in its early stages of development or undergoing extensive code refactoring—particularly given its similarities with TGToxic." The development comes as a group of researchers from the Georgia Institute of Technology, German International University, and Kyung Hee University detailed a backend malware analysis service called DVa – short for Detector of Victim-specific Accessibility – to flag malware exploiting accessibility features on Android devices. "Using dynamic execution traces, DVa further utilizes an abuse-vector-guided symbolic execution strategy to identify and attribute abuse routines to victims," they said. "Finally, DVa detects [accessibility]-empowered persistence mechanisms to understand how malware obstructs legal queries or removal attempts."
Daily Brief Summary
New Android banking malware, ToxicPanda, identified infecting over 1,500 devices, primarily facilitates unauthorized money transfers via account takeover.
The malware likely originates from a Chinese-speaking threat actor, showing similarities with another malware, TgToxic, which affects crypto wallets.
Majorly impacting users in Italy, Portugal, Hong Kong, Spain, and Peru, ToxicPanda sidesteps banking security measures like identity verification and behavioral detection.
ToxicPanda masquerades as popular applications like Google Chrome, using counterfeit pages for distribution, exploiting Android accessibility services for elevated access and data manipulation.
The malware can bypass two-factor authentication by capturing OTPs from SMS or authenticator apps, allowing remote attackers to control compromised devices and make unauthorized transactions.
Researchers accessed the command-and-control interface of ToxicPanda and observed that it could facilitate real-time remote operational directives across the infected network.
Despite its capabilities, the malware exhibits signs that it may still be in early development stages or undergoing significant code revisions, with certain functions appearing as placeholders.
Researchers emphasize the importance of tools like DVa to detect malware exploiting Android's accessibility features, highlighting advancements toward victim-specific identification and prevention.