HomeCyber BalkansErrorFather Hackers Targeting Android Users for Remote Control Gain

ErrorFather Hackers Targeting Android Users for Remote Control Gain

Published on

spot_img

The notorious Cerberus Android banking trojan, known for targeting financial and social media apps, has continued to evolve and spread through various forks and variants, creating new threats in the cybersecurity landscape.

Recently, a new campaign named ErrorFather has been uncovered, leveraging the Cerberus source code and employing a multi-stage dropper mechanism to deploy the banking trojan payload. This campaign, identified in September 2024, has shown a surge in malicious samples in recent weeks, signaling ongoing activity and the potential harm it could cause to unsuspecting users.

The malware utilizes a multi-stage dropping technique, where the first-stage dropper installs a second-stage dropper from its assets using a session-based installation. The second-stage dropper, packed and dependent on a native library (libmcfae.so), decrypts and loads the final payload. This final payload, decrypted.dex, contains malicious functionalities like keylogging, overlay attacks, and remote access capabilities.

The ErrorFather campaign disguises the modified Cerberus banking trojan through obfuscation and code reorganization, making it challenging to detect. While initially identified as a new banking trojan based on its detection count, further analysis revealed strong code similarities with Cerberus, especially in its shared preference settings and structure. However, the C&C structure of the ErrorFather variant differed from the original Cerberus and the more recent Phoenix botnet, showing a unique evolution of the malware.

The malware retrieves C&C server lists using two methods: statically from a primary C&C server and dynamically using a Domain Generation Algorithm (DGA), which generates domains based on the current Istanbul time using MD5 and SHA-1 hashing. When the primary C&C server is unavailable, the malware attempts to connect to the generated domains, similar to the behavior observed in the Alien malware.

The malware performs various actions, including sending device information, retrieving and storing data from the server, capturing screen images for VNC functionality, gathering sensitive data like keystrokes and contacts using accessibility services, and sending error logs to the C&C server. It also checks for registered users and sends device status updates, showcasing continuous monitoring and control over the infected device.

Using an overlay attack, the Cerberus malware deceives victims into entering sensitive information by overlaying a fake phishing page on top of legitimate applications. This tactic aims to trick victims into divulging login credentials and credit card details, enabling the malware to carry out financial fraud efficiently.

According to the CRIL, the ErrorFather campaign leverages VNC, keylogging, and HTML injection to steal financial information, demonstrating the concerning capabilities of the Cerberus-based banking Trojan. Despite the age of the malware, the modified Cerberus has managed to evade detection, illustrating the persistent threat of Cerberus-based attacks fueled by cybercriminals repurposing leaked malware source code.

In conclusion, the evolving nature of the Cerberus Android banking trojan, as demonstrated by the ErrorFather campaign, highlights the need for enhanced cybersecurity measures to combat the ever-changing tactics employed by cybercriminals. Vigilance and robust security protocols are crucial in safeguarding users against the persistent threat of malware attacks in today’s interconnected digital landscape.

Source link

Latest articles

Hackers Compromise Laravel-Lang Packages in 700 GitHub Repositories

Active Supply Chain Attack Targets Laravel-Lang Open-Source Organization A sophisticated and active supply chain attack...

Surge of 738% in AI-Driven DDoS Attacks Within the Finance Sector

Escalating Cyber Threats in Financial Services: A Call for Enhanced Security Measures Financial services organizations...

Ubiquiti Addresses Serious UniFi OS Privilege Escalation Vulnerabilities

Ubiquiti Addresses Critical Security Vulnerabilities in UniFi OS Ubiquiti, the renowned technology company specializing in...

UK GCA Launches £2.9B Defense Tech Framework for SMEs

UK Government Expands Access to £2.88 Billion Defense Technology Procurement Framework On May 18, the...

More like this

Hackers Compromise Laravel-Lang Packages in 700 GitHub Repositories

Active Supply Chain Attack Targets Laravel-Lang Open-Source Organization A sophisticated and active supply chain attack...

Surge of 738% in AI-Driven DDoS Attacks Within the Finance Sector

Escalating Cyber Threats in Financial Services: A Call for Enhanced Security Measures Financial services organizations...

Ubiquiti Addresses Serious UniFi OS Privilege Escalation Vulnerabilities

Ubiquiti Addresses Critical Security Vulnerabilities in UniFi OS Ubiquiti, the renowned technology company specializing in...