A new Android malware is seen spreading across devices, targeting various financial and banking apps including some offered by Indian banks. As per reports, the malware imitates the banking app to steal login credentials.
Quick Heal Security Labs has uncovered the Android Banking Trojan that targets 232 banking apps along with the apps offered by Indian banks.The malware gets automatically installed from various third-party stores. The malware is known as Android.banker.A2f8a, previously detected as Android.banker.A9480.
The Android Banking Trojan steals login credentials like most other malware apps. Following this, it also hijacks SMSs, uploads contact list and SMS on a malicious server as well as it displays an overlay screen on legitimate apps to carry other malicious activities.
It is reported that the malware is distributed through a fake Flash player app on third-party stores. Because of Adobe flash player's prevalence on the internet, it's the easiest target for attackers to spread the malware.
After installing the malware from the fake flash player, it pops-up a request asking to activate administrative rights. Even if you deny or cancel the process, the application will again pop-up the same request until the user activates the admin privileges. Once the admin privileges are activated, the malicious app hides from the menu and phone display.
As a result, the app runs in the background and carries out malicious activities without easy detection. It scans for the targeted 232 banking apps in the victim's smartphone. If anyone of the apps is found on the device, then the app shows a fake notification on behalf of targeted banking app. Once the user clicks the notification, it pops-up a fake login screen asking for user credentials of net banking login ID and password. If the user enters these, the credentials are received by the attacker.
Here is the list of Financial and Banking apps that are targeted and attacked by the Android Banking Trojan. Almost 232 apps are found vulnerable, of these some are offered by Indian banks.
snapwork.IDBI (IDBI Bank GO Mobile+)
idbibank.abhay_card (Abhay by IDBI Bank Ltd)
com.idbi (IDBI Bank GO Mobile)
sbi.SBIFreedomPlus (SBI Anywhere Personal)
hdfcquickbank (HDFC Bank MobileBanking LITE)
csam.icici.bank.imobile (iMobile by ICICI Bank)
idbi.mpassbook (IDBI Bank mPassbook)
co.bankofbaroda.mpassbook (Baroda mPassbook)
unionbank.ecommerce.mobile.android (Union Bank Mobile Banking)
unionbank.ecommerce.mobile.commercial.legacy (Union Bank Commercial Clients)
axis.mobile (Axis Mobile)
snapwork.hdfc (HDFC Bank MobileBanking)
Stay far from the third party store and links provided in emails and SMSs
Disable the ‘Unknown Sources’ option to avoid installing apps from unknown sources.
Try to install a reliable mobile security app. This can block and detect the malicious apps to a large extent.
Always keep your OS up-to-date.
Important to note, never trust the flash player app. Because there is no official Adobe flash player app available on Google Playstore since Android 4.1