January 14, 2016 By Douglas Bonderud 2 min read

Android malware is off to a running start in 2016. According to the International Business Times, Google just removed 13 apps carrying the Brain Test malware from its Play store. More worrisome, two Trojan deployments — SlemBunk and Android.Bankosy — are now targeting financial apps used by millions of Android owners. Here’s a quick rundown.

Android Trojan Brings Organized Chaos

SecurityWeek reported that Android Trojan SlemBunk is part of a well-organized and still-evolving chain of malware attacks. Security firm FireEye first analyzed the Trojan in December 2015 and found that it targeted 33 banking apps from financial institutions across North America, Europe and Asia-Pacific. Apps infected with the malicious code are downloaded to user devices through both legitimate adult websites and malicious redirection, often disguised as reputable tools such as Adobe Flash Player.

While the malware is still in a state of flux, security researchers now know that it first triggers drive-by downloads to retrieve the SlemBunk dropper app. Next the dropper unpacks the logic required to recover and deploy a downloader, which in turn contacts the command-and-control (C&C) server to grab the final payload.

This longer-than-average chain of events makes it difficult to track origin servers. What’s more, the app lies in wait until a relevant banking process is initiated. Once detected, SlemBunk generates a customized phishing page that convinces users to hand over personal details.

Forward or Back?

One way to solve the problem of attacks like SlemBunk is two-factor authentication. Along with a username and password, banking customers must also enter a one-time code generated when they try to log in, which is sent to their mobile device via SMS. Not surprisingly, however, clever malware-makers discovered a way to intercept these SMS codes and still break the bank, leading some financial institutions to institute a voice-only policy with codes delivered via automated calling services.

According to PCWorld, however, the makers of mobile Trojan Android.Bankosy have also cracked this code and found a way to forward voice-delivered passcodes to a different telephone number. In the Asia-Pacific region, for example, the service code *21*[destination number]# is often used to forward calls.

By combining this code with malware designed to enable silent mode and keep users locked out of their phone during the bank’s passcode call, victims are unaware the two-factor process has been compromised. If malicious actors already have basic login credentials, it becomes a difficult task for users to convince banks they’ve been hacked because, by all accounts, security is working as intended.

The value of Android Trojan malware is on the rise as smartphones and tablets become go-to devices for financial transactions. Both long-chain attacks like SlemBunk and innovative hacks such as Android.Bankosy are looking for new ways to grab user data and leave no trace behind. This double dose of banking malware means users must apply caution in equal measure.

More from

Apple Intelligence raises stakes in privacy and security

3 min read - Apple’s latest innovation, Apple Intelligence, is redefining what’s possible in consumer technology. Integrated into iOS 18.1, iPadOS 18.1 and macOS Sequoia 15.1, this milestone puts advanced artificial intelligence (AI) tools directly in the hands of millions. Beyond being a breakthrough for personal convenience, it represents an enormous economic opportunity. But the bold step into accessible AI comes with critical questions about security, privacy and the risks of real-time decision-making in users’ most private digital spaces.AI in every pocketHaving sophisticated AI…

Government cybersecurity in 2025: Former Principal Deputy National Cyber Director weighs in

4 min read - As 2024 comes to an end, it’s time to look ahead to the state of public cybersecurity in 2025.The good news is this: Cybersecurity will be an ongoing concern for the government regardless of the party in power, as many current cybersecurity initiatives are bipartisan. But what will government cybersecurity look like in 2025?Will the country be better off than they are today? What are the positive signs that could signal a good year for national cybersecurity? And what threats should…

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today