Article Details

Original Article Text

Click to Toggle View

New DroidBot Android banking malware spreads across Europe. A new Android banking malware named 'DroidBot' attempts to steal credentials for over 77 cryptocurrency exchanges and banking apps in the UK, Italy, France, Spain, and Portugal. According to Cleafy researchers who discovered the new Android malware, DroidBot has been active since June 2024 and operates as a malware-as-a-service (MaaS) platform, selling the tool for $3,000/month. At least 17 affiliate groups have been identified using malware builders to customize their payloads for specific targets. Although DroidBot lacks any novel or sophisticated features, analysis of one of its botnets revealed 776 unique infections across the UK, Italy, France, Turkey, and Germany, indicating a significant activity. Also, Cleafy says the malware appears to be under heavy development at the time, with signs of attempting expansion to new regions, including Latin America. The DroidBot MaaS operation DroidBot's developers, who appear to be Turkish, provide affiliates with all the tools required to conduct attacks. This includes the malware builder, command and control (C2) servers, and a central administration panel from which they can control their operations, retrieve stolen data, and issue commands. Multiple affiliates operate on the same C2 infrastructure, with unique identifiers assigned to each group, allowing Cleafy to identify 17 threat groups. The payload builder allows the affiliates to customize DroidBot to target specific applications, use different languages, and set other C2 server addresses. Affiliates are also provided access to detailed documentation, support from the malware's creators, and access to a Telegram channel where updates are published regularly. All in all, the DroidBot MaaS operation makes the barrier of entry fairly low for inexperienced or low-skilled cybercriminals. Impersonating popular apps DroidBot is often masqueraded as Google Chrome, Google Play store, or 'Android Security' as a way to trick users into installing the malicious app. However, in all cases, it acts as a trojan attempting to steal sensitive information from apps.  The main features of the malware are: A key aspect of DroidBot's operation is the abuse of Android's Accessibility Services to monitor user actions and simulate swipes and taps on behalf of the malware. Therefore, if you install an app that requests strange permissions, like the Accessibility Services, you should immediately become suspicious and deny the request. Among the 77 apps DroidBot attempts to steal credentials, some standouts include Binance, KuCoin, BBVA, Unicredit, Santander, Metamask, BNP Paribas, Credit Agricole, Kraken, and Garanti BBVA. To mitigate this threat, Android users are advised to only download apps from Google Play, scrutinize permission requests upon installation, and make sure Play Protect is active on their devices.

Daily Brief Summary

MALWARE // DroidBot Malware Targets Banking and Crypto Apps Across Europe

DroidBot, a new Android banking malware, targets over 77 banking and cryptocurrency apps across several European countries.

The malware operates under a malware-as-a-service (MaaS) model, available to affiliates for $3,000 per month.

Discovered active since June 2024, DroidBot has infected 776 devices in countries including the UK, Italy, France, Turkey, and Germany.

Affiliates can customize payloads for targeted attacks using provided tools such as a malware builder, command and control servers, and a central admin panel.

Despite its lack of innovative features, DroidBot's significant activity and ongoing development suggest potential expansion into Latin America.

It often masquerades as legitimate apps like Google Chrome or the Google Play store to deceive users into installation.

Users are advised to only download apps from reliable sources, closely monitor permission requests, and ensure Play Protect is enabled to mitigate risks.