Close Menu
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
Facebook X (Twitter) Instagram
Trending
  • Jennifer Lopez and Ben Affleck reveal summer plans after Europe trip
  • T20 World Cup: Quiet contributions from Akshar Patel, Kuldeep Yadav and Ravindra Jadeja justify Rohit Sharma’s spin vision | Cricket News
  • The impact of a sedentary lifestyle on health
  • Bartok: The World of Lilette
  • Economists say the sharp rise in the U.S. budget deficit will put a strain on Americans’ incomes
  • Our Times: Williams memorial unveiled on July 4th | Lifestyle
  • Heatwaves in Europe are becoming more dangerous: what it means for travelers
  • Christian Science speaker to visit Chatauqua Institute Sunday | News, Sports, Jobs
Facebook X (Twitter) Instagram
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
The Daily PostingThe Daily Posting
Android

Vultur Android banking Trojan returns with upgraded remote control capabilities

thedailyposting.comBy thedailyposting.comApril 1, 2024No Comments

[ad_1]

Android banking trojan

The Android banking Trojan known as Vultur has re-emerged with a set of new features and improved anti-analysis and evasion techniques that allow operators to remotely manipulate mobile devices and collect sensitive data. I did.

“Vultur also encrypts C2 communications and uses multiple encrypted payloads that are decrypted on the fly to perform malicious actions under the guise of a legitimate application,” said NCC Group researcher Joshua Kampf. “They are starting to disguise more malicious activity by doing so.” Report released last week.

Vultur was first made public in early 2021, and the malware was able to leverage Android’s accessibility APIs to perform malicious actions.

The malware has been observed to be distributed via a Trojanized dropper app on the Google Play Store, disguised as an authenticator or productivity app to trick unsuspecting users into installing it. I am. These dropper apps are provided as part of a dropper-as-a-service (DaaS) operation called Brunhilda.

Other attack chains observed by NCC Group include droppers that are spread using a combination of SMS messages and phone calls, a technique known as telephone-directed attack delivery (TOAD), which ultimately results in malware updates. Provide the version.

cyber security

“The first SMS message directs the victim to the phone,” Kampf said. When the victim calls that number, the scammer provides the victim with her second SMS containing a link to the dropper. [legitimate] McAfee security app. ”

The initial SMS message aims to induce a false sense of urgency by instructing the recipient to call a number that authorizes a non-existent transaction involving a large amount of money.

Upon installation, the malicious dropper executes three associated payloads: two APKs and one DEX file. These payloads register the bot with the C2 server, obtain accessibility service permissions for remote access via AlphaVNC and ngrok, and execute commands retrieved from the C2 server.

One of the notable additions to Vultur is the ability to remotely interact with infected devices through Android’s accessibility services, including clicking, scrolling, and swiping, as well as downloading, uploading, deleting, installing, and searching files. is what you can do.

Additionally, the malware has the ability to prevent victims from interacting with a predefined list of apps, display custom notifications in the status bar, and bypass lock screen security measures by disabling Keyguard. is also equipped.

Android banking trojan

“Vultur’s recent developments demonstrate a shift in focus to maximizing remote control of infected devices,” Kampf said.

“With the ability to issue commands like scrolling, swipe gestures, clicks, volume adjustments, blocking apps from running, and even incorporating file manager functionality, the primary goal is to gain complete control over a compromised device. It is clear that this is the case.”

This development comes as Team Cymru revealed that the Android banking Trojan Octo (also known as Coper) has moved to malware-as-a-service operations, offering its services to other information-stealing actors. It was done in response.

“This malware offers a variety of advanced features, including keylogging, intercepting SMS messages and push notifications, and controlling the device screen,” the company said.

cyber security

“Various injects are used to steal sensitive information such as passwords and login credentials by displaying fake screens and overlays. Additionally, they use VNC (Virtual Network Computing) for remote access to devices. We will utilize this information to strengthen our monitoring capabilities.”

The Octo campaign is estimated to have compromised 45,000 devices, primarily across Portugal, Spain, Turkey, and the United States. Some of the other victims are in France, the Netherlands, Canada, India and Japan.

The findings point to a new campaign targeting Android users in India, distributing malicious APK packages masquerading as online booking, billing, and courier services via malware-as-a-service (MaaS) services. This was followed by the appearance of

Broadcom Inc.’s Symantec said in a bulletin that the malware “targets stealing banking information, SMS messages, and other sensitive information from victims’ devices.”

Did you find this article interesting? Follow us twitter ○ You can read more exclusive content from us on LinkedIn.



[ad_2]

Source link

thedailyposting.com
  • Website

Related Posts

Qualcomm wants to make it easier for phone makers to issue Android updates

June 28, 2024

Qualcomm wants to make Android updates easier for OEMs

June 28, 2024

What’s new in the June 2024 Google system update for Android

June 28, 2024
Leave A Reply Cancel Reply

ads
© 2025 thedailyposting. Designed by thedailyposting.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms of Service
  • Advertise with Us
  • 1711155001.38
  • xtw183871351
  • 1711198661.96
  • xtw18387e4df
  • 1711246166.83
  • xtw1838741a9
  • 1711297158.04
  • xtw183870dc6
  • 1711365188.39
  • xtw183879911
  • 1711458621.62
  • xtw183874e29
  • 1711522190.64
  • xtw18387be76
  • 1711635077.58
  • xtw183874e27
  • 1711714028.74
  • xtw1838754ad
  • 1711793634.63
  • xtw183873b1e
  • 1711873287.71
  • xtw18387a946
  • 1711952126.28
  • xtw183873d99
  • 1712132776.67
  • xtw183875fe9
  • 1712201530.51
  • xtw1838743c5
  • 1712261945.28
  • xtw1838783be
  • 1712334324.07
  • xtw183873bb0
  • 1712401644.34
  • xtw183875eec
  • 1712468158.74
  • xtw18387760f
  • 1712534919.1
  • xtw183876b5c
  • 1712590059.33
  • xtw18387aa85
  • 1712647858.45
  • xtw18387da62
  • 1712898798.94
  • xtw1838737c0
  • 1712953686.67
  • xtw1838795b7
  • 1713008581.31
  • xtw18387ae6a
  • 1713063246.27
  • xtw183879b3c
  • 1713116334.31
  • xtw183872b3a
  • 1713169981.74
  • xtw18387bf0d
  • 1713224008.61
  • xtw183873807
  • 1713277771.7
  • xtw183872845
  • 1713329335.4
  • xtw183874890
  • 1716105960.56
  • xtw183870dd9
  • 1716140543.34
  • xtw18387691b

Type above and press Enter to search. Press Esc to cancel.