-1.2 C
New York
Wednesday, January 15, 2025

Xenomorph Android malware now targets U.S. banks and crypto wallets


Xenomorph Android malware now targets U.S. banks and crypto wallets

Safety researchers found a brand new marketing campaign that distributes a brand new model of the Xenomorph malware to Android customers in the USA, Canada, Spain, Italy, Portugal, and Belgium.

Analysts at cybersecurity firm ThreatFabric have been monitoring Xenomorph exercise since February 2022 and notice that the brand new marketing campaign launched in mid-August.

The newest model of Xenomorph is concentrating on customers of cryptocurrency wallets and varied U.S. monetary establishments.

Xenomorph background

Xenomorph first appeared within the wild in early 2022, working as a banking trojan that focused 56 European banks by way of display screen overlay phishing. It was distributed by way of Google Play, the place it counted over 50,000 installations.

Its authors, “Hadoken Safety,” continued growth, and in June 2022, they launched a rewritten model that made the malware modular and extra versatile.

By then, Xenomorph was on Zimperium’s prime ten most prolific banking trojans, so it had already achived the “main risk” standing.

In August 2022, ThreatFabric reported that Xenomorph was being distributed by way of a brand new dropper named “BugDrop,” which bypassed safety features in Android 13.

In December 2022, the identical analysts reported a few new malware distribution platform dubbed “Zombinder,” which embedded the risk into respectable Android apps’ APK file.

Most just lately, in March 2023, Hadoken launched the third main model of Xenomorph, that includes an automatic switch system (ATS) for autonomous on-device transactions, MFA bypass, cookie stealing, and the power to focus on over 400 banks.

New marketing campaign

Within the newest marketing campaign, the malware operators opted to make use of phishing pages, luring guests to replace their Chrome browser and trick them into downloading the malicious APK.

Fake Chrome update notice
Faux Chrome replace discover (ThreatFabric)

The malware continues to make use of overlays to steal data. Nonetheless, it has now expanded its concentrating on scope to incorporate monetary establishments from the USA and a number of cryptocurrency apps.

Overlay mechanism in latest Xenomorph
Overlay mechanism in newest Xenomorph (ThreatFabric)

ThreatFabric explains that every Xenomorph pattern is loaded with roughly 100 overlays concentrating on completely different units of banks and crypto apps, relying on the focused demographic.

Number of targets seen in recent samples
Variety of targets seen in latest samples (ThreatFabric)
“[..]this newest marketing campaign additionally added loads of monetary establishments from the USA, along with a number of crypto-wallet functions, totaling greater than 100 completely different targets per pattern, every one utilizing a particularly crafted overlay to steal treasured PII from the sufferer’s contaminated gadget.” – ThreatFabric
Banking trojans targeting U.S. institutions
Banking trojans concentrating on U.S. establishments (ThreatFabric)

Newest model

Though the brand new Xenomorph samples aren’t vastly completely different from earlier variants, they arrive with some new options indicating that its authors proceed to refine and improve the malware.

First, a brand new “mimic” function will be activated by a corresponding command, giving the malware the potential to behave as one other utility.

Moreover, mimic​​ has a built-in exercise named IDLEActivity, which acts as a WebView to show respectable internet content material from the context of a trusty course of.

This technique replaces the necessity to cover icons from the app launcher post-installation, which is flagged as suspicious habits by most cellular safety instruments.

Xenomorph's new mimic system
Xenomorph’s new mimic system (ThreatFabric)

One other new function is “ClickOnPoint,”, which permits Xenomorph operators to simulate faucets at particular display screen coordinates.

This enables the operators to maneuver previous affirmation screens or carry out different easy actions with out using the total ATS module, which could set off safety warnings.

Lastly, there is a new “antisleep” system that stops the gadget from switching off its display screen by way of an energetic notification.

That is helpful for prolonging the engagement and avoiding interruptions that require re-establishing command and management communications.

Different findings

By profiting from weak safety measures from the malware operator, ThreatFabric analysts might entry their payload internet hosting infrastructure.

There, they found further malicious payloads, together with the Android malware variants Medusa and Cabassous, the Home windows data stealers RisePro and LummaC2, and the Personal Loader malware loader.

Customers ought to be cautious with prompts on cellular to replace their browsers, as these are seemingly a part of malware distribution campaigns.

Xenomorph’s distribution alongside potent Home windows malware suggests collaboration between risk actors or the potential for the Android trojan being bought as Malware-as-a-Service (MaaS).

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles