Thanks to the growing adoption of
mobile banking, in combination with the
utilization of mobile devices to conduct financial transactions,
opportunistic cybercriminals are quickly capitalizing on this emerging
market segment. Made evident by the release of Android/BlackBerry
compatible
mobile malware bots. This
site is empowering potential cybercriminals with the necessary
‘know-how’ when it comes to ‘cashing out’ compromised accounts of
E-banking victims who have opted-in to receive SMS notifications/phone
verification, whenever a particular set of financial events take place
on their bank accounts.
A new commercially available
Android,
BlackBerry (work in progress) — supporting mobile malware bot is being
pitched by its vendor, with a specific emphasis on its potential to
undermine modern E-banking security processes, like for instance, SMS
alerts. Let’s discuss some of its core features and emphasize on an
emerging trend within the cybercrime ecosystem, namely the
‘infiltration’ of Google Play as a service.
Sample screenshots from the mobile malware bot’s manual+the actual administration panel:
a

Priced at $4,000, the bot’s features can be used to
undermine two factor authentication/SMS
alerts protection features offered by a financial institution, as well
as result in a direct privacy violations once the integrity and
confidentiality of the mobile device has been compromised.
Some of the bot’s core features include:
- hijack incoming SMS messages and silently forwarding them to any given number in real-time
- hijacking of any incoming calls and silently forwarding them to any given number in real-time
- complete access to the SMS messages on the affected device
- complete access to the Call History of an affected device
- complete access to the Contacts found on an affected device
- audio recording using the device’s microphone, the uploading the file to a server
- sending an SMS on behalf of the infected device’s owner
- call any number of behalf of the infected device’s owner
- control the infected mobile device through an Internet connection,
or through SMS messages in cases where no Internet connection is
available
- get the phone number, as well as the ICCID, IMEI, IMSI, Model and OS of the infected device
Based on requests from potential customers, the interface can be
localized to their “favorite language”. What’s also worth emphasizing on
regarding this particular commercially available mobile malware bot, is
that, the vendor is also offering the option to have your malware
variant directly made available to the millions of Google Play users.
How does this take place to begin with? In a pretty simple way, taking
into consideration the fact that cybercriminals continue to actively
data mine their botnet’s ‘infected population’ in an attempt to monetize
the outcome of their campaigns. Through the acquisition of compromised
Google Play accounts, cybercriminals are perfectly positioned to abuse
this access to a legitimate/verified developer’s account, for fraudulent
and malicious purposes.
We’ll continue monitoring the development of this mobile malware bot,
and post updates as soon as its vendor introduces any features that
could continue adapting to current/emerging anti mobile banking fraud
processes.
No comments:
Post a Comment