Article Details
Scrape Timestamp (UTC): 2025-08-18 18:14:31.788
Original Article Text
Click to Toggle View
ERMAC Android malware source code leak exposes banking trojan infrastructure. The source code for version 3 of the ERMAC Android banking trojan has been leaked online, exposing the internals of the malware-as-a-service platform and the operator’s infrastructure. The code base was discovered in an open directory by Hunt.io researchers while scanning for exposed resources in March 2024. They located an archive named Ermac 3.0.zip, which contained the malware’s code, including backend, frontend (panel), exfiltration server, deployment configurations, and the trojan’s builder and obfuscator. The researchers analyzed the code, finding that it significantly expanded the targeting capabilities compared to previous versions, with more than 700 banking, shopping, and cryptocurrency apps. ERMAC was first documented in September 2021 by ThreatFabric - a provider of online payment fraud solutions and intelligence for the financial services sector, as an evolution of the Cerberus banking trojan operated by a threat actor known as ‘BlackRock.’ ERMAC v2.0 was spotted by ESET in May 2022, rented to cybercriminals for a monthly fee of $5,000, and targeting 467 apps, up from 378 in the previous version. In January 2023, ThreatFabric observed BlackRock promoting a new Android malware tool named Hook, which appeared to be an evolution of ERMAC. ERMAC v3.0 capabilities Hunt.io found and analyzed ERMAC’s PHP command-and-control (C2) backend, React front-end panel, Go-based exfiltration server, Kotlin backdoor, and the builder panel for generating custom trojanized APKs. According to the researchers, ERMAC v3.0 now targets sensitive user information in more than 700 apps. Additionally, the latest version expands on previously documented form-injection techniques, uses AES-CBC for encrypted communications, features an overhauled operator panel, and enhances data theft and device control. Specifically, Hunt.io has documented the following capabilities for the latest ERMAC release: Infrastructure exposed Hunt.io analysts used SQL queries to identify live, exposed infrastructure currently used by the threat actors, identifying C2 endpoints, panels, exfiltration servers, and builder deployments. Apart from exposing the malware’s source code, the ERMAC operators had several other major opsec failures, including hardcoded JWT tokens, default root credentials, and no registration protections on the admin panel, allowing anyone to access, manipulate, or disrupt ERMAC panels. Finally, the panel names, headers, package names, and various other operational fingerprints left little doubt about attribution and made discovery and mapping of the infrastructure a lot easier. The ERMAC V3.0 source code leak weakens the malware operation, first by eroding customer trust in the MaaS in its ability to protect information from law enforcement or allow running campaigns with low detection risk. Threat detection solutions are also likely to get better at spotting ERMAC. However, if the source code falls into the hands of other threat actors, it is possible to observe in the future modified variants of ERMAC that are more difficult to detect. Picus Blue Report 2025 is Here: 2X increase in password cracking 46% of environments had passwords cracked, nearly doubling from 25% last year. Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.
Daily Brief Summary
Hunt.io researchers discovered the ERMAC v3.0 source code in an open directory, revealing the malware's infrastructure and operational details.
The leaked code includes backend, frontend, exfiltration server, deployment configurations, and tools for creating customized malicious APKs.
ERMAC v3.0 targets over 700 apps, including banking, shopping, and cryptocurrency platforms, expanding its reach from previous versions.
The malware employs advanced techniques such as AES-CBC encryption and improved form-injection methods for enhanced data theft and device control.
Significant operational security failures were found, including hardcoded JWT tokens and default root credentials, compromising the malware's integrity.
The leak is expected to diminish trust in the malware-as-a-service platform and improve threat detection capabilities against ERMAC.
There is a risk that other threat actors could adapt the leaked source code, potentially leading to more sophisticated and harder-to-detect variants in the future.