Android users beware, mobile banking malware on the prowl
16 May, 2020
A mobile banking malware called "EventBot", which steals personal financial information, may affect Android phone users in India, the federal cyber-security agency has said in a latest advisory.
The CERT-In has issued a caution, saying the Trojan virus may "masquerade as the best application such as Microsoft Word, Adobe flash and others using third-party application downloading sites to infiltrate into victim device".
A Trojan is a virus or malware that cheats a victim to stealthily attack its computer or phone-operating system.
"It's been observed that a new Android mobile malware named EventBot is spreading.
"It is a mobile-banking Trojan and info-stealer that abuses Android's in-built accessibility features to steal user data from financial applications, read user SMS messages and intercept SMS messages, allowing malware to bypass two-factor authentication," the CERT-In advisory said.
The Computer Emergency Response Team of India (CERT-In) is the national technology arm to combat cyber attacks and guard the Indian cyber space.
"EventBot", it said, targets over 200 different financial applications, including banking applications, money-transfer services and cryptocurrency wallets, or financial applications based in the US and Europe region right now however, many of their services may affect Indian users aswell.
The virus "largely targets financial applications like Paypal Business, Revolut, Barclays, UniCredit, CapitalOne UK, HSBC UK, TransferWise, Coinbase, paysafecard etc.," the CERT-In said.
The agency said while "EventBot" has not been "seen" on Google Playstore till now, it can "masquerade" as a genuine mobile phone application.
"Once installed on victim's Android device, it asks permissions such as controlling system alerts, reading external storage content, installing additional packages, accessing internet, whitelisting it to ignore battery optimisation, prevent processor from sleeping or dimming the screen, auto-initiate upon reboot, receive and read SMS messages and continue running and accessing data in the backdrop," the advisory explained.
The virus further prompts the users to provide access to their device accessibility services.
"Also, it can retrieve notifications about other installed applications and read contents of other applications.
"Over the time, it can also read Lock Screen and in-app PIN that may give attacker more privileged access over victim device," the advisory said.
The cyber security agency has suggested certain counter-measures to check the virus infection into Android phones:
"Usually do not download and install applications from untrusted sources like unknown websites and links on unscrupulous messages; install updated anti-virus solution; ahead of downloading or installing software (even from Google Playstore), always review the app details, number of downloads, user reviews, comments and the 'additional information' section.
Exercise caution while visiting trusted/un-trusted sites for clicking links; install Android updates and patches as and when available; users are advised to use device encryption or encrypting external Sdcard feature available with almost all of the Android operating-system."
In addition, it asked users to avoid using unsecured, unknown Wi-Fi networks and for prior confirming of a banking/financial iphone app from the source organisation.
"Be sure to have a solid AI (artificial intelligence) powered mobile antivirus installed to detect and block this sort of tricky malware if it ever makes its way on your system," the advisory states.
Source:
TAG(s):