Article Details
Scrape Timestamp (UTC): 2024-05-18 14:12:54.344
Original Article Text
Click to Toggle View
Android malware Grandoreiro returns after police disruption. The Android banking trojan "Grandoreiro" is spreading in a large-scale phishing campaign in over 60 countries, targeting customer accounts of roughly 1,500 banks. In January 2024, an international law enforcement operation involving Brazil, Spain, Interpol, ESET, and Caixa Bank announced the disruption of the malware operation, which had been targeting Spanish-speaking countries since 2017 and caused $120 million in losses. At the same time, five arrests and thirteen search and seizure actions occurred across Brazil. However, no information was provided on the arrested individuals' roles in the operation. IBM's X-Force team reports that Grandoreiro appears to have returned to large-scale operations since March 2024, likely rented to cybercriminals via a Malware-as-a-Service (MaaS) model, and now targeting English-speaking countries too. Additionally, the trojan itself has undergone a technical revamp that added many new powerful features and improvements, indicating that its creators evaded arrest and weren't deterred by the previous crackdown. New phishing campaigns Since multiple threat actors rent the malware, the phishing lures are diverse and crafted specifically for the organizations a particular cybercriminal is targeting. Phishing emails seen by IBM impersonate government entities in Mexico, Argentina, and South Africa, mainly tax administration organizations, revenue services, and federal electricity commissions. The emails are written in the recipient's native language, incorporate official logos and formats, and contain a call to action, such as clicking links to view invoices, account statements, or tax documents. When recipients click on those emails, they are redirected to an image of a PDF that triggers the download of a ZIP file containing a bloated (100 MB) executable, which is the Grandoreiro loader. New Grandoreiro features IBM X-Force noticed several new features and significant updates in the latest variant of the Grandoreiro banking trojan, making it a more evasive and effective threat. These can be summarized in the following: Another notable new feature is Grandoreiro's ability to perform detailed victim profiling and decide whether or not it will execute on the device, which gives operators better control of their targeting scope. IBM analysts report that the latest version of the trojan avoids execution in specific countries like Russia, Czechia, the Netherlands, and Poland, as well as on Windows 7 machines in the United States where no antivirus is active. The above clearly indicates that despite the recent law enforcement action, Grandoreiro is alive and kicking, and unfortunately, it looks stronger than ever.
Daily Brief Summary
Android banking trojan Grandoreiro has reemerged, targeting over 1,500 banks in 60 countries after previously being disrupted by international law enforcement in January 2024.
The malware operation, initially affecting Spanish-speaking countries and causing $120 million in losses, now expands its phishing campaigns to English-speaking regions.
Grandoreiro is likely available through a Malware-as-a-Service model, outfitted with new, advanced features that increase its evasiveness and effectiveness.
Phishing emails utilized by the malware impersonate government entities from various countries, using native languages and official logos to entice victims to download malicious files.
New technical enhancements in Grandoreiro include detailed victim profiling and selective execution, avoiding detection in certain countries and under specific system conditions.
Despite significant law enforcement actions including arrests and seizures, the creators of Grandoreiro appear to have evaded capture, continuing to develop and distribute the trojan.
IBM's X-Force team has identified these updates and continues to monitor the evolving threat landscape posed by this resilient cyber threat.