December 17, 2015 By Larry Loeb 2 min read

Russian antivirus firm Dr. Web has found some new Android malware it has dubbed ZBot, according to a report from the security researchers. Its name may stem from the fact that it’s similar to the Zeus Trojan and targets mobile banking customers. It appears to have been going after users in Russia since February 2015.

About ZBot

There are three variants of the malware: Android.ZBot.1.origin, Android.ZBot.2.origin and Android.ZBot.3.origin. The latter two are newer than the first and most likely were designed to evade antivirus and other detection programs.

The injection program looks like a normal Android utility, usually the Google Play app. The infected app is placed on a website and downloaded by users who think they are getting the original software. After installation, the malware tries to obtain administrator privileges via an error message that mandates the unwitting user reboot the system.

If this ploy fails initially, the malware will display a phishing page where victims are instructed to enter payment card information. This phishing page is also displayed even if the malware gains admin privileges but only for a limited time.

How the Malware Works

Let’s say the malware does trick the user into granting admin privileges. It is then launched when the mobile device is rebooted. Cybercriminals can then command ZBot to send SMS messages to specified numbers, make phone calls, track location via GPS and display phishing pages on top of specified banking applications, SecurityWeek reported.

When a banking application is detected, a specially designed phishing page downloaded from the command-and-control (C&C) center of the malware is displayed on top of it. The malware is designed to target the customers of numerous banks that operate in Russia, and the page it displays is specific to the detected bank.

Some of these banks will allow users to carry out transactions via SMS message so the malware may send special SMS commands that will take money directly from bank accounts and send it to the cybercriminals. Users are usually not even aware this has happened, according to Dr. Web, because the malware will intercept confirmation messages.

Users Must Remain Alert

Security researchers discovered that all of ZBot’s modifications are controlled by different servers, the addresses of which are stored in a special database of the malicious program. They have detected more than 20 C&C servers for the malware — and noted that at least 15 are still active.

Dr. Web claimed that the Trojan was flagged more than 25,000 times during the observation period. And with servers still active, the malware will likely remain a threat — especially if it moves beyond its existing geo-targeted locations.

They also make the ominous warning that the bot may spread. “We cannot exclude the possibility that fraudsters will not limit their targets to Russian users only, and not expand the geography of these attacks to other countries including Europe and the United States,” the Dr. Web researchers said.

It seems the way around this one is to only load programs from trusted sites. There are also some remediation methods Dr. Web recommended for users on any operating system.

More from

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today