Article Details
Scrape Timestamp (UTC): 2024-12-04 23:18:59.836
Original Article Text
Click to Toggle View
New DroidBot Android malware targets 77 banking, crypto apps. A new Android banking malware named 'DroidBot' attempts to steal credentials for over 77 cryptocurrency exchanges and banking apps in the UK, Italy, France, Spain, and Portugal. According to Cleafy researchers who discovered the new Android malware, DroidBot has been active since June 2024 and operates as a malware-as-a-service (MaaS) platform, selling the tool for $3,000/month. At least 17 affiliate groups have been identified using malware builders to customize their payloads for specific targets. Although DroidBot lacks any novel or sophisticated features, analysis of one of its botnets revealed 776 unique infections across the UK, Italy, France, Turkey, and Germany, indicating a significant activity. Also, Cleafy says the malware appears to be under heavy development at the time, with signs of attempting expansion to new regions, including Latin America. The DroidBot MaaS operation DroidBot's developers, who appear to be Turkish, provide affiliates with all the tools required to conduct attacks. This includes the malware builder, command and control (C2) servers, and a central administration panel from which they can control their operations, retrieve stolen data, and issue commands. Multiple affiliates operate on the same C2 infrastructure, with unique identifiers assigned to each group, allowing Cleafy to identify 17 threat groups. The payload builder allows the affiliates to customize DroidBot to target specific applications, use different languages, and set other C2 server addresses. Affiliates are also provided access to detailed documentation, support from the malware's creators, and access to a Telegram channel where updates are published regularly. All in all, the DroidBot MaaS operation makes the barrier of entry fairly low for inexperienced or low-skilled cybercriminals. Impersonating popular apps DroidBot is often masqueraded as Google Chrome, Google Play store, or 'Android Security' as a way to trick users into installing the malicious app. However, in all cases, it acts as a trojan attempting to steal sensitive information from apps. The main features of the malware are: A key aspect of DroidBot's operation is the abuse of Android's Accessibility Services to monitor user actions and simulate swipes and taps on behalf of the malware. Therefore, if you install an app that requests strange permissions, like the Accessibility Services, you should immediately become suspicious and deny the request. Among the 77 apps DroidBot attempts to steal credentials, some standouts include Binance, KuCoin, BBVA, Unicredit, Santander, Metamask, BNP Paribas, Credit Agricole, Kraken, and Garanti BBVA. To mitigate this threat, Android users are advised to only download apps from Google Play, scrutinize permission requests upon installation, and make sure Play Protect is active on their devices.
Daily Brief Summary
DroidBot, a new Android banking malware, has been designed to steal credentials from 77 banking and cryptocurrency apps in several European countries.
Detected by Cleafy researchers, DroidBot is sold as Malware-as-a-Service (MaaS) for $3,000 per month, indicating its commercialization.
Active since June 2024, the malware has affected numerous users across the UK, Italy, France, Turkey, and Germany with over 776 unique infections recorded.
Seventeen affiliate groups utilize this malware, customizing it for targeted attacks, highlighting the scalability and adaptability of DroidBot.
The malware often disguises itself as legitimate applications like Google Chrome or the Android Security suite to deceive users into installation.
Strategic use of Android’s Accessibility Services by DroidBot allows it to monitor user actions and simulate inputs, making it particularly invasive.
Researchers noted the ongoing development and potential expansion of DroidBot, suggesting evolving threats to regions beyond its current scope, including Latin America.
Android users are advised to only install apps from the Google Play Store, be vigilant about permission requests, and utilize Play Protect feature to mitigate risks associated with such malware.