A new Android malware strain ‘Ghimob’ is mimicking third-party mobile (mainly banking) apps to spy and steal user data when downloaded and installed. This Trojan virus steals data from users, primarily targeting online banking and cryptocurrency.

As of the end of 2020, it is believed to siphon data from more than 153 apps by asking for accessibility permissions and using debugger checks. And the risk is high for victims, as attackers can bypass banking institutions’ security measures and make transactions on Android users’ smartphones.

Here is what you need to know to protect yourself from this latest malware attack.

How Ghimob Malware Works

Ghimob malware works by sitting in a mobile device and searching for banking apps. Then, it opens a door for a threat actor to steal money while another app is running as a cover.

The Ghimob group will use emails or malicious sites to redirect users to websites promoting Android apps. An email is usually sent to a user with a link. This link takes the users to an authentic-looking app, mostly provided by a fraudulent creditor. The Ghimob Trojan malware installs itself and then sends a message back to the command-and-control (C2) server containing the victims’ phone data, including the model and the screen lock details. Then, it steals sensitive user information.

These apps also mimicked official apps and brands, such as Google Defender, Google Docs, WhatsApp Updater and Flash Update.

Kaspersky Lab spotted this iteration of Ghimob malware while keeping track of a Windows malware effort conducted by the threat actors known as Guildma. The security firm learned that the campaign downloaded an APK installer for Ghimob if victims clicked on one of the campaign’s malicious URLs using an Android-based browser.

The malware’s APK installers posed as installers for popular apps. At the time of discovery, they weren’t available for download on Google’s Play Store, but were hosted on several domains registered to Guildma’s operators.

Once installed, the remote access Trojan (RAT) malware ran a series of tests to check for emulators and debuggers. It terminated itself if any of those tests came back positive. Otherwise, the Ghimob malware requested that the victims provide it with accessibility permissions.

Once granted, the RAT malware sent a message to its notification server. This included the model of the infected device, whether that Android phone had a screen lock and a list of installed apps.

Spying From the Inside

Once embedded in a phone, Ghimob uses the data it collects to keep an eye out for 153 mobile apps belonging to banks, fintechs and cryptocurrency exchanges based in Brazil, Germany, Portugal, Peru, Paraguay, Angola and Mozambique. When it finds one of those apps running on an infected device, it begins to spy on the app.

From there, the malware tells its handlers about the accessibility settings on the infected device. It does so using fallback command-and-control (C2) — in this case, hardcoded C2 providers that the Ghimob malware contacted to obtain the actual C2 address. This technique helps the malware’s handlers maintain ongoing command and control.

The Tétrade Family of Banking Trojans

Guildma is a well-known banking Trojan developed by Brazilian threat actors and found around the world. First seen in 2015, this malware has attracted security researchers’ attention by abusing Living Off the Land binaries (LOLbins) or legitimate binaries that are native to a computer, along with payloads hosted on YouTube and Facebook. These techniques have helped the threat to target users in Brazil, China and Europe.

Kaspersky Lab analyzed Guildma and its Ghimob malware in the context of the Tétrade family of banking Trojans, a group of four large banking Trojan families first created in Brazil. The Tétrade consists of Guildma as well as Javali, Melcoz and Grandoreiro.

While those are the largest banking Trojan enterprises in Brazil, there are plenty of others. Operations like AVLay and others use two-factor authentication bypasses and fake chat windows to prey upon financial institutions and their customers.

How to Defend Against Ghimob Malware

Users can defend themselves against threats, such as Ghimob malware, by following mobile security best practices. These guidelines include downloading apps from only trusted groups on official mobile app stores and keeping mobile devices up to date. Use common sense: don’t approve permissions that aren’t required for an app’s advertised purpose.

At the same time, organizations can protect users against financial services cyber threats by adding artificial intelligence and multifactor authentication into their apps. These features can help to prevent threats like Ghimob malware from using an overlay attack to gain access to a customer’s account.

More from Software Vulnerabilities

X-Force discovers new vulnerabilities in smart treadmill

7 min read - This research was made possible thanks to contributions from Joshua Merrill. Smart gym equipment is seeing rapid growth in the fitness industry, enabling users to follow customized workouts, stream entertainment on the built-in display, and conveniently track their progress. With the multitude of features available on these internet-connected machines, a group of researchers at IBM X-Force Red considered whether user data was secure and, more importantly, whether there was any risk to the physical safety of users. One of the most…

X-Force releases detection & response framework for managed file transfer software

5 min read - How AI can help defenders scale detection guidance for enterprise software tools If we look back at mass exploitation events that shook the security industry like Log4j, Atlassian, and Microsoft Exchange when these solutions were actively being exploited by attackers, the exploits may have been associated with a different CVE, but the detection and response guidance being released by the various security vendors had many similarities (e.g., Log4shell vs. Log4j2 vs. MOVEit vs. Spring4Shell vs. Microsoft Exchange vs. ProxyShell vs.…

MSMQ QueueJumper (RCE Vulnerability): An in-depth technical analysis

13 min read - The security updates released by Microsoft on April 11, 2023, addressed over 90 individual vulnerabilities. Of particular note was CVE-2023-21554, dubbed QueueJumper, a remote code execution vulnerability affecting the Microsoft Message Queueing (MSMQ) service. MSMQ is an optional Windows component that enables applications to exchange messages via message queues that are reachable both locally and remotely. This analysis was performed in collaboration with the Randori and X-Force Adversary Services teams, by Valentina Palmiotti, Fabius Watson, and Aaron Portnoy. Research motivations…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today