Android banking botnet targets thousands

Researchers from the Czech Technical University, UNCUYO University and Avast have discovered a new Android banking botnet targeting Russian...

Researchers from the Czech Technical University, UNCUYO University and Avast have discovered a new Android banking botnet targeting Russian citizens that has been operating since at least 2016.

The Geost botnet has infected over 800,000 Android devices according to researchers' estimation and the hackers behind it potentially control several million Euros.

The unusual discovery of the botnet was made when the hackers decided to trust a malicious proxy network built using a malware called HtBot. The HtBot malware provides a proxy service which can be rented to provide users with a pseudo-anonymous connection to the internet. By analyzing HtBot network communication, the researchers discovered the large malicious operation.

The hackers behind the botnet also failed to encrypt their communications which gave the researchers an unprecedented view into their inner workers. Their chat logs revealed how they accessed servers, brought new devices into the botnet and evaded antivirus software.

Geost botnet and banking Trojan

Avast researcher Anna Shirakova explained how the poor choices made by the group gave the researchers a great deal of insight into their operations, saying:

“We really got an unprecedented view into how an operation like this functions. Because this group made some very poor choices in how it tried to hide its actions, we were able to see not just samples of the malware, but also delve deep into how the group works with lower level operatives bringing devices into the botnet and higher level operatives determining how much money was under their control. All told, there were over eight hundred thousand victims and the group potentially controlled millions in currency.” 

The Geost botnet appears to be a complex infrastructure of infected Android smartphones. The phones are first infected with Android APKs which resemble different fake applications including fake banking apps and fake social networks. Once an infected phone connects to the botnet, it is remotely controlled and the attackers can access and send SMS messages, communicate with banks and redirect the device's traffic to different sites. The hackers can also access a great deal of personal information from users of these infected devices.

After the infection, command and control servers store a complete list of SMS messages of all the victims beginning the moment the device became infected. These messages are processed offline in the C&C server to automatically compute the bank balance of each victim.

The Geost botnet has a complex infrastructure made up of at least 13 C&C IP addresses, over 140 domains and more than 140 APK files. The primary targets of the banking Trojan were five banks, though the majority were from Russia.



from TechRadar - All the latest technology news https://ift.tt/2InOpYB
via IFTTT

COMMENTS

BLOGGER
Name

Apps,3858,Business,151,Camera,1155,Earn $$$,3,Gadgets,1741,Games,926,GTA,1,Innovations,3,Mobile,1697,Paid Promotions,5,Promotions,5,Sports,1,Technology,8106,Trailers,796,Travel,37,Trending,4,Trendly News,25335,TrendlyNews,183,Video,5,XIAOMI,13,YouTube - 9to5Google,182,
ltr
item
Trendly News | #ListenNow #Everyday #100ShortNews #TopTrendings #PopularNews #Reviews #TrendlyNews: Android banking botnet targets thousands
Android banking botnet targets thousands
Trendly News | #ListenNow #Everyday #100ShortNews #TopTrendings #PopularNews #Reviews #TrendlyNews
http://www.trendlynews.in/2019/10/android-banking-botnet-targets-thousands.html
http://www.trendlynews.in/
http://www.trendlynews.in/
http://www.trendlynews.in/2019/10/android-banking-botnet-targets-thousands.html
true
3372890392287038985
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share. STEP 2: Click the link you shared to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy