The security problems that have plagued Android devices in the past continue to dominate headlines. Now, security researchers from Russian antivirus specialist Dr. Web reported that cybercriminals had posted the source code for an Android Trojan and instructions on how to make the most of it on an underground hacking forum.

The researchers said the open availability of the code could lead to an increased risk of banking Trojan attacks. Android users, both businesses and individual consumers, should take appropriate security steps.

Banking Trojan Source Code Leaked

The miscreants, Dr. Web reported, published the malware’s source code about a month ago. Even more worryingly, the firm has already detected instances of this code in the wild.

Fraudsters modified the original source code and released a banking Trojan known as Android.BankBot. This Trojan is injected into Android application packages (APKs) and distributed through popular applications that are available online or via third-party app stores, The Hacker News reported.

Android.BankBot tracks the launch of banking applications, payment services and social media apps such as Facebook, Instagram and Twitter to steal the device owner’s personal information.

The Trojans Are Coming

The Trojan then uploads stolen data online and provides a way for cybercriminals to steal cash through a back-end application. Android.BankBot can also intercept and send text messages, and prevent users from accessing important messages from financial organizations.

But the distribution of the source code behind Android.BankBot is even more newsworthy than the potential loss of personal information and banking details. According to Dr. Web, Trojans are normally created by virus writers and sold online for significant amounts of cash — not posted for free. Researchers at the firm predicted that many similar Trojans will soon appear due to the availability of the source code.

Advice for Android Users

The Trojan relies on tricking users into granting administrator privileges. Users should be suspicious of applications asking for access to deep-lying functionalities and avoid providing undue privileges.

The Hacker News also advised IT leaders to turn off the ability to download APKs from third-party sources, educate users about the risk of opening attachments or clicking links from unknown sources and avoid unsecured Wi-Fi hotspots.

More from

Emotional Blowback: Dealing With Post-Incident Stress

Cyberattacks are on the rise as adversaries find new ways of creating chaos and increasing profits. Attacks evolve constantly and often involve real-world consequences. The growing criminal Software-as-a-Service enterprise puts ready-made tools in the hands of threat actors who can use them against the software supply chain and other critical systems. And then there's the threat of nation-state attacks, with major incidents reported every month and no sign of them slowing. Amidst these growing concerns, cybersecurity professionals continue to report…

RansomExx Upgrades to Rust

IBM Security X-Force Threat Researchers have discovered a new variant of the RansomExx ransomware that has been rewritten in the Rust programming language, joining a growing trend of ransomware developers switching to the language. Malware written in Rust often benefits from lower AV detection rates (compared to those written in more common languages) and this may have been the primary reason to use the language. For example, the sample analyzed in this report was not detected as malicious in the…

Why Operational Technology Security Cannot Be Avoided

Operational technology (OT) includes any hardware and software that directly monitors and controls industrial equipment and all its assets, processes and events to detect or initiate a change. Yet despite occupying a critical role in a large number of essential industries, OT security is also uniquely vulnerable to attack. From power grids to nuclear plants, attacks on OT systems have caused devastating work interruptions and physical damage in industries across the globe. In fact, cyberattacks with OT targets have substantially…

Resilient Companies Have a Disaster Recovery Plan

Historically, disaster recovery (DR) planning focused on protection against unlikely events such as fires, floods and natural disasters. Some companies mistakenly view DR as an insurance policy for which the likelihood of a claim is low. With the current financial and economic pressures, cutting or underfunding DR planning is a tempting prospect for many organizations. That impulse could be costly. Unfortunately, many companies have adopted newer technology delivery models without DR in mind, such as Cloud Infrastructure-as-a-Service (IaaS), Software-as-a-Service (SaaS)…