Android Malware[Android.banker.A9480] to Target Banking Apps on your Mobile

232
malware in Android

An Android malware named ‘Android.banker.A9480’ is reportedly targeting over 232 banking apps including a few banks in India. This Trojan malware is designed to steal personal data from users, Quick Heal Security Labs reports. Similar to other banking malware, this one also sneaks into login data, SMS, contact lists and uploads them to a malicious server. Additionally, apart from the banking apps, this Trojan also targets cryptocurrency apps present on a user’s phone.

Here is the list of banking apps those are targeted by the Android banking Trojan malware:

  • Axis mobile
  • HDFC Bank MobileBanking
  • SBI Anywhere Personal
  • HDFC Bank MobileBanking LITE
  • iMobile by ICICI Bank
  • IDBI Bank GO Mobile+
  • Abhay by IDBI Bank Ltd,
  • IDBI Bank GO Mobile,
  • IDBI Bank mPassbook
  •  Baroda mPassbook,
  • Union Bank Mobile Banking and
  • Union Bank Commercial Clients.

The malware Android.banker.A9480 gets circulated via a fake Flash Player app on third-party stores, Quick Heal said. The Flash Player app is a popular target for cybercriminals due to its prevalence. Once users download the malicious application, they get several prompts to activate administrative rights. The app sends numerous pop-ups to victims until the administrative privileges are activated. The Malware sends a fake notification that resembles the banking app. When users open the notification, they get a fake login window that is then used by the attackers to extract confidential data like login ID and password.

As per Quick heal, the malware can process commands like sending and collecting SMS, upload contact list and location, display fake notification, accessibility and GPS permission, and more. Since the malware can intercept incoming and outgoing SMS from an infected smartphone, it is also able to bypass the OTP based two-factor authentication on the user’s bank account.

LEAVE A REPLY

Please enter your comment!
Please enter your name here