HomeCII/OTNew Android Malware "Ajina.Banker" Steals 2FA Codes and Spreads via Telegram

New Android Malware “Ajina.Banker” Steals 2FA Codes and Spreads via Telegram

Published on

spot_img

In a recent development, Central Asia has found itself under attack by a devious new Android malware known as Ajina.Banker. This malicious software, discovered by cybersecurity firm Group-IB in May 2024, has been causing chaos since November 2023, with researchers identifying approximately 1,400 unique variations of the malware.

Named after a malevolent Uzbek mythical spirit associated with deception and chaos, Ajina.Banker employs a stealthy approach to target unsuspecting users. The malware disguises itself as reputable applications such as banking services, government portals, and everyday utilities in order to deceive individuals into downloading and running the malicious file, ultimately compromising their devices.

The primary method of distribution for Ajina.Banker is through social engineering tactics on messaging platforms like Telegram. Attackers create multiple accounts to disseminate malicious links and files disguised as enticing offers or promotions, tricking users into downloading and installing the malware under false pretenses of lucrative rewards or exclusive access.

Furthermore, the attackers utilize a multi-faceted strategy by sending messages containing the malicious file alone, exploiting users’ curiosity. They also share links to channels hosting the malware, evading security measures present on some community chats. By employing localized promotion techniques and themed messages, the attackers create a sense of urgency and excitement within regional community chats, encouraging users to click on links or download files without suspicion.

While initially targeting users in Uzbekistan, Ajina.Banker has managed to expand its reach beyond borders. The malware is capable of gathering information on financial applications installed in various countries such as Armenia, Azerbaijan, Iceland, and Russia. Additionally, it collects SIM card details and intercepts incoming SMS messages, potentially capturing 2FA codes used for securing financial accounts.

An analysis of the malware reveals the existence of two distinct versions, com.example.smshandler and org.zzzz.aaa, indicating ongoing development. Newer iterations of the malware showcase enhanced functionalities, including the capability to steal user-provided phone numbers, bank card details, and PIN codes.

Group-IB’s investigation into Ajina.Banker suggests that the malware operates on an affiliate program model, with a core group managing the infrastructure while a network of affiliates handles distribution and infection chains, likely receiving a share of the stolen funds as an incentive.

To safeguard oneself and one’s devices against Ajina.Banker and similar threats, it is advised to exercise caution when dealing with unsolicited messages and downloads, stick to trusted app stores like Google Play Store, scrutinize app permissions, install security software, and stay informed about the latest malware threats and best practices for mobile security.

Rocky Cole, Co-Founder and COO of mobile device security company iVerify, emphasized the importance of running EDR platforms on phones to detect malicious APKs and social engineering attempts, highlighting credential theft as a prevalent threat in the current landscape of cybersecurity.

As the prevalence of Android malware continues to rise, it is imperative for users to remain vigilant and proactive in safeguarding their personal information and devices from malicious actors seeking to exploit vulnerabilities in the digital realm.

In conclusion, the emergence of Ajina.Banker underscores the need for increased awareness and robust security measures to thwart the nefarious activities of cybercriminals targeting individuals in Central Asia and beyond. By staying informed and implementing preventive measures, users can mitigate the risks posed by such malicious software and protect themselves from falling victim to financial fraud and data theft.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...