ANDROID BANKER: EVENBOT

Since March, there have been signs of a new trojan in the sphere of banking malware for Android. The name given to this new family is ‘Eventbot’. This is mainly due to the fact that the word ‘event’ is used in the malicious app package identifier, probably because of its novel functionality of using accessibility events to steal credentials.

Most banking trojans use accessibility events to detect when an application is opened, before showing a webinject with a phishing form that siphons off the victim’s credentials.

BASBANKE/COYBOT BANKING TROJAN

BasBanke, also known as CoyBot, has been very active in recent weeks, in the form of new propagation campaigns for new samples in which it has not only supplanted other brands to make the user believe that it is a legitimate application, but has also impersonated to banking entities in specific versions that only affect said entities.

There have been no changes at a technical level with respect to past campaigns. However, the big news is the inclusion of new affected banking entities.

GLOBAL ANALYSIS OF BANKING MALWARE

What should we expect in the future? For the future we can expect more malware, mainly Ransomware. Ransomware attacks increased significantly in 2019, and don’t only attack users anymore. .

There have been attacks on companies, seeking to obtain the greatest possible benefit. Hijacking user documents is one of the best ways to earn money, since users desperate to recover them may end up paying to do so.

ANALYZING TRICKBOT, ONE OF THE MOST POPULAR BANKING MALWARES FOR WINDOWS

Although malware for mobile devices has gained popularity in recent years due to the rise of smartphones, where almost anything can be managed today, desktop malware is still there.

Moreover, with the improvements introduced in threat detection, it is the malware developers who evolve and include increasingly complex functionalities to achieve their objective and steal banking credentials.

GINP IS ONE OF THE NEW BANKING TROJANS SPECIFICALLY AIMED AT SPANISH BANKING

Theft of banking credentials is based on 'overlays' that are shown to the user when he or she starts the legitimate application of the affected bank. In addition to the use of 'overlays', GINP uses the same techniques as the rest of the Android banking Trojans to detect the start of legitimate apps, implementing an accessibility service that receives the events that occur in the user interface.

It is especially curious that this malware has gone from being a spy Trojan to being a banking Trojan which, additionally, only affects Spanish banking entities. This indicates that these samples are specially designed to affect Spanish users.

NEW VERSION OF THE CERBERUS BANKING TROJAN TARGETS SPANISH AND LATIN AMERICAN ENTITIES

The samples arrived through our automatic malware analysis systems, and the propagation vectors used by the criminals could not be found in the study made.

Probably, as usual with this type of malware, the distribution of the malicious APK was effected through fraudulent web pages.

NEW ‘HOST MODIFIER’-TYPE MALWARE THAT AFFECTS BANKS IN LATIN AMERICA

Trojans of the Host Modifier type are usually distributed through fake SPAM emails, in which it is common for the attacker to impersonate public agencies or companies. This modus operandi is not exclusive to this malware family, as we can see that there are other families that affect Latin American entities and also use these tricks.