Close Menu
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
Facebook X (Twitter) Instagram
Trending
  • Jennifer Lopez and Ben Affleck reveal summer plans after Europe trip
  • T20 World Cup: Quiet contributions from Akshar Patel, Kuldeep Yadav and Ravindra Jadeja justify Rohit Sharma’s spin vision | Cricket News
  • The impact of a sedentary lifestyle on health
  • Bartok: The World of Lilette
  • Economists say the sharp rise in the U.S. budget deficit will put a strain on Americans’ incomes
  • Our Times: Williams memorial unveiled on July 4th | Lifestyle
  • Heatwaves in Europe are becoming more dangerous: what it means for travelers
  • Christian Science speaker to visit Chatauqua Institute Sunday | News, Sports, Jobs
Facebook X (Twitter) Instagram
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
The Daily PostingThe Daily Posting
Android

Vultur banking malware for Android pretends to be McAfee Security app

thedailyposting.comBy thedailyposting.comMarch 30, 2024No Comments

[ad_1]

Security researchers have discovered Vultur, a new version of the Android banking Trojan that includes more advanced remote control capabilities and improved evasion mechanisms.

Researchers at fraud detection firm ThreatFabric first recorded the malware in March 2021 and observed it being distributed on Google Play through dropper apps in late 2022.


At the end of 2023, mobile security platform Zimperium included Vultur in its top 10 most active banking Trojans of the year, noting that nine of its variants targeted 122 banking apps in 15 countries. did.

A new, more evasive version of Vultur is spreading to victims through a hybrid attack that relies on smishing (SMS phishing) and phone calls, tricking targets into using Vultur, reports Fox-IT, part of the NCC Group. If you install a version of Malware masquerading as the McAfee security app.

Vultur’s new infection chain

Vultur’s latest infection chain begins when victims receive an SMS message alerting them to a fraudulent transaction and instructing them to call a designated number for instructions.

The call is answered by a scammer who convinces the victim to open the link received in the second SMS. This link will take you to a site that provides a modified version of the McAfee Security app.

Inside the trojanized McAfee Security app is a “Brunhilda” malware dropper.

Upon installation, the app decrypts and executes three Vultur-related payloads (two APKs and one DEX file) to gain access to accessibility services, initialize the remote control system, and perform command and control (C2 ) Establish a connection with the server.

Vultur infection chain (Fox-IT)

New features

The latest version of the Vultur malware analyzed by researchers retains some key features of older versions, including screen recording, keylogging, and remote access via AlphaVNC and ngrok, allowing attackers to perform real-time monitoring and It allows for control.

Compromised device identity information (Fox-IT)

Compared to older variants, the new Vultur introduces various new features, including:

  • File management actions such as downloading, uploading, deleting, installing, and searching for files on your device.
  • Use accessibility services to perform click, scroll, and swipe gestures.
  • Block specific apps from running on the device and display custom HTML or a “Temporarily Unavailable” message to users.
  • Displaying custom notifications in the status bar to mislead victims.
  • Disabling Keyguard bypasses your lock screen security and gives you unrestricted access to your device.
Some of the functionality of the third payload (Fox-IT)

In addition to these features, the latest version of Vultur also supports encryption of C2 communications (AES + Base64), use of multiple encrypted payloads that are decrypted on the fly if necessary, and malicious intent disguised as New evasion mechanisms have also been added, such as hiding certain activities. of a legitimate app.

encrypted POST request (Fox-IT)

Additionally, the malware uses native code to decrypt the payload, making the reverse engineering process more difficult and also helping to evade detection.

Researchers say Vultur’s developers focused on improving remote control capabilities of infected devices using commands such as scrolling, swipe gestures, clicks, volume control, and blocking app execution. It is pointed out that it seems that

It is clear that the malware authors have made efforts to improve the stealthiness of the malware and add new features at a rapid pace, and future versions are likely to add even more features. is shown.

To minimize the risk of malware infection on Android, we recommend that users only download apps from trusted repositories, such as Android’s official app store or Google Play, and avoid clicking URLs in messages. .

We always recommend checking the permissions an app requests during installation and only agreeing to the permissions required for the app’s core functionality. For example, a password management app shouldn’t require access to your phone’s camera or microphone.

[ad_2]

Source link

thedailyposting.com
  • Website

Related Posts

Qualcomm wants to make it easier for phone makers to issue Android updates

June 28, 2024

Qualcomm wants to make Android updates easier for OEMs

June 28, 2024

What’s new in the June 2024 Google system update for Android

June 28, 2024
Leave A Reply Cancel Reply

ads
© 2025 thedailyposting. Designed by thedailyposting.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms of Service
  • Advertise with Us
  • 1711155001.38
  • xtw183871351
  • 1711198661.96
  • xtw18387e4df
  • 1711246166.83
  • xtw1838741a9
  • 1711297158.04
  • xtw183870dc6
  • 1711365188.39
  • xtw183879911
  • 1711458621.62
  • xtw183874e29
  • 1711522190.64
  • xtw18387be76
  • 1711635077.58
  • xtw183874e27
  • 1711714028.74
  • xtw1838754ad
  • 1711793634.63
  • xtw183873b1e
  • 1711873287.71
  • xtw18387a946
  • 1711952126.28
  • xtw183873d99
  • 1712132776.67
  • xtw183875fe9
  • 1712201530.51
  • xtw1838743c5
  • 1712261945.28
  • xtw1838783be
  • 1712334324.07
  • xtw183873bb0
  • 1712401644.34
  • xtw183875eec
  • 1712468158.74
  • xtw18387760f
  • 1712534919.1
  • xtw183876b5c
  • 1712590059.33
  • xtw18387aa85
  • 1712647858.45
  • xtw18387da62
  • 1712898798.94
  • xtw1838737c0
  • 1712953686.67
  • xtw1838795b7
  • 1713008581.31
  • xtw18387ae6a
  • 1713063246.27
  • xtw183879b3c
  • 1713116334.31
  • xtw183872b3a
  • 1713169981.74
  • xtw18387bf0d
  • 1713224008.61
  • xtw183873807
  • 1713277771.7
  • xtw183872845
  • 1713329335.4
  • xtw183874890
  • 1716105960.56
  • xtw183870dd9
  • 1716140543.34
  • xtw18387691b

Type above and press Enter to search. Press Esc to cancel.