December 17, 2015 By Larry Loeb 2 min read

Russian antivirus firm Dr. Web has found some new Android malware it has dubbed ZBot, according to a report from the security researchers. Its name may stem from the fact that it’s similar to the Zeus Trojan and targets mobile banking customers. It appears to have been going after users in Russia since February 2015.

About ZBot

There are three variants of the malware: Android.ZBot.1.origin, Android.ZBot.2.origin and Android.ZBot.3.origin. The latter two are newer than the first and most likely were designed to evade antivirus and other detection programs.

The injection program looks like a normal Android utility, usually the Google Play app. The infected app is placed on a website and downloaded by users who think they are getting the original software. After installation, the malware tries to obtain administrator privileges via an error message that mandates the unwitting user reboot the system.

If this ploy fails initially, the malware will display a phishing page where victims are instructed to enter payment card information. This phishing page is also displayed even if the malware gains admin privileges but only for a limited time.

How the Malware Works

Let’s say the malware does trick the user into granting admin privileges. It is then launched when the mobile device is rebooted. Cybercriminals can then command ZBot to send SMS messages to specified numbers, make phone calls, track location via GPS and display phishing pages on top of specified banking applications, SecurityWeek reported.

When a banking application is detected, a specially designed phishing page downloaded from the command-and-control (C&C) center of the malware is displayed on top of it. The malware is designed to target the customers of numerous banks that operate in Russia, and the page it displays is specific to the detected bank.

Some of these banks will allow users to carry out transactions via SMS message so the malware may send special SMS commands that will take money directly from bank accounts and send it to the cybercriminals. Users are usually not even aware this has happened, according to Dr. Web, because the malware will intercept confirmation messages.

Users Must Remain Alert

Security researchers discovered that all of ZBot’s modifications are controlled by different servers, the addresses of which are stored in a special database of the malicious program. They have detected more than 20 C&C servers for the malware — and noted that at least 15 are still active.

Dr. Web claimed that the Trojan was flagged more than 25,000 times during the observation period. And with servers still active, the malware will likely remain a threat — especially if it moves beyond its existing geo-targeted locations.

They also make the ominous warning that the bot may spread. “We cannot exclude the possibility that fraudsters will not limit their targets to Russian users only, and not expand the geography of these attacks to other countries including Europe and the United States,” the Dr. Web researchers said.

It seems the way around this one is to only load programs from trusted sites. There are also some remediation methods Dr. Web recommended for users on any operating system.

More from

Remote access risks on the rise with CVE-2024-1708 and CVE-2024-1709

4 min read - On February 19, ConnectWise reported two vulnerabilities in its ScreenConnect product, CVE-2024-1708 and 1709. The first is an authentication bypass vulnerability, and the second is a path traversal vulnerability. Both made it possible for attackers to bypass authentication processes and execute remote code.While ConnectWise initially reported that the vulnerabilities had proof-of-concept but hadn’t been spotted in the wild, reports from customers quickly made it clear that hackers were actively exploring both flaws. As a result, the company created patches for…

Evolving red teaming for AI environments

2 min read - As AI becomes more ingrained in businesses and daily life, the importance of security grows more paramount. In fact, according to the IBM Institute for Business Value, 96% of executives say adopting generative AI (GenAI) makes a security breach likely in their organization in the next three years. Whether it’s a model performing unintended actions, generating misleading or harmful responses or revealing sensitive information, in the AI era security can no longer be an afterthought to innovation.AI red teaming is emerging…

What we can learn from the best collegiate cyber defenders

3 min read - This year marked the 19th season of the National Collegiate Cyber Defense Competition (NCCDC). For those unfamiliar, CCDC is a competition that puts student teams in charge of managing IT for a fictitious company as the network is undergoing a fundamental transformation. This year the challenge involved a common scenario: a merger. Ten finalist teams were tasked with managing IT infrastructure during this migrational period and, as an added bonus, the networks were simultaneously attacked by a group of red…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today