A newly identified Chameleon campaign has set its sights on targeting employees within the hospitality industry, using deceptive tactics to disguise malicious software as a Customer Relationship Management (CRM) app. Researchers analyzing file names uploaded to VirusTotal have uncovered evidence pointing to targeted attacks, with specific references to a prominent international restaurant chain. This tailored approach indicates that cybercriminals are focusing on compromising specific organizations within the hospitality sector.
The campaign’s main objective is to infect devices with corporate banking access, allowing the Chameleon malware to gain control over business accounts. This poses a significant threat to organizations, as unauthorized access to banking information can result in financial losses and reputation damage.
One of the key aspects of this campaign is its focus on employees in CRM-related roles, who are likely to have access to valuable corporate data. By targeting high-value individuals, the attackers increase their chances of successfully infiltrating the organization’s network and carrying out malicious activities.
A critical development in this Chameleon campaign is the use of a newly identified dropper that can bypass security restrictions in Android 13. This marks a significant evolution in banking Trojan capabilities and highlights the increasing accessibility of Android bypass techniques following the release of BrokewellDropper’s source code to the public.
Upon activation, the malicious dropper displays a fake CRM login screen, prompting employees to enter their credentials. Subsequently, a deceptive prompt encourages the reinstallation of the application, which secretly installs the Chameleon payload. This payload is designed to bypass security measures in Android 13 and later versions, specifically targeting accessibility service restrictions to establish a covert foothold on the device.
After installation, the malicious actors deployed a fake website that prompts users for credentials. Upon submission, the website displays an error message, indicating potential credential harvesting or further malicious activity beyond credential acquisition. The Chameleon malware operates in the background, utilizing keylogging to steal sensitive information and pose a significant threat that can be exploited for additional attacks or sold on the dark web.
The Mobile Threat Intelligence team has identified Chameleon targeting specific financial institutions, where it masquerades as a security app to install a fraudulent security certificate. This evolving tactic emphasizes the need for robust countermeasures to combat the ever-changing landscape of mobile threats and cyber attacks.
Cybercriminals are increasingly focusing on targeting employees of business-to-consumer (B2C) companies to gain unauthorized access to business banking accounts through mobile devices. As demonstrated by the Chameleon campaign, the rise of mobile banking products for Small and Medium-sized Enterprises (SMEs) presents new opportunities for attackers to exploit vulnerabilities in mobile security.
To combat these threats, financial institutions need to proactively educate their business customers about the risks of malware infections and the potential consequences of falling victim to such attacks. By implementing robust anomaly detection systems and malware detection capabilities, banks can enhance visibility into customer accounts, effectively safeguarding assets from unauthorized access and fraudulent activities.
In conclusion, the Chameleon campaign targeting hospitality employees highlights the need for organizations to remain vigilant against evolving cyber threats and to implement strong security measures to protect against unauthorized access and data breaches. By staying informed and proactive in their approach to cybersecurity, businesses can mitigate the risks posed by advanced malware campaigns like Chameleon.

