Latest News Latest News

New Android Malware Steals Banking Passwords, Private Data and Keystrokes

NA new type of mobile banking malware has been discovered abusing Android's accessibility features to exfiltrate sensitive data from financial applications, read user SMS messages, and hijack SMS-based two-factor authentication codes.


Called "EventBot" by Cybereason researchers, the malware is capable of targeting over 200 different financial apps, including banking, money transfer services, and crypto-currency wallets such as Paypal Business, Revolut, Barclays, CapitalOne, HSBC, Santander, TransferWise, and Coinbase.

"EventBot is particularly interesting because it is in such early stages," the researchers said. "This brand new malware has real potential to become the next big mobile malware, as it is under constant iterative improvements, abuses a critical operating system feature, and targets financial applications."ew Android Malware Steals Banking Passwords, Private Data and Keystrokes
The campaign, first identified in March 2020, masks its malicious intent by posing as legitimate applications (e.g., Adobe Flash, Microsoft Word) on rogue APK stores and other shady websites, which, when installed, requests extensive permissions on the device.

The permissions include access to accessibility settings, the ability to read from external storage, send and receive SMS messages, run in the background, and launch itself after system boot.

If a user grants access, EventBot operates as a keylogger and can "retrieve notifications about other installed applications and content of open windows," in addition to exploiting Android's accessibility services to grab lockscreen PIN and transmit all the collected data in an encrypted format to an attacker-controlled server.

The ability to parse SMS messages also makes the banking trojan a useful tool to bypass SMS-based two-factor authentication, thereby giving the adversaries easy access to a victim's cryptocurrency wallets and steal funds from bank accounts.

This is not the first time mobile malware has targeted financial services. Last month, IBM X-Force researchers detailed a new TrickBot campaign, called TrickMo, that was found exclusively targeting German users with malware that misused accessibility features to intercept one-time passwords (OTP), mobile TAN (mTAN), and pushTAN authentication codes.

"Giving attacker access to a mobile device can have severe business consequences, especially if the end-user is using their mobile device to discuss sensitive business topics or access enterprise financial information," Cybereason researchers concluded. "This can result in brand degradation, loss of individual reputation, or loss of consumer trust."

EventBot's family of malicious apps may not be active on the Google Play Store, but it's yet another reminder of why users should stick to official app stores and avoid sideloading apps from untrusted sources. Keeping the software up-to-date and turning on Google Play Protect can also go a long way towards protecting devices from malware.


Contact Us Contact Us

Free Call[OH]: 933

Phone Number: +251-993939270,

                            +251-936825343,

                            +251-944-33-68-02

E-mail: ethiocert@insa.gov.et

P.O.Box: 124498

Download PGP Keys


Report an Incident

Values Values

  • Trustworthiness
  • Innovation
  • Scientific
  • Democracy
  • Synergy
  • Saving