Ad

Fake Recruiters Spread Banking Trojan Through Malicious Apps in New Phishing Scam



Sophisticated Mobile Phishing Campaign Unveiled

Cybersecurity experts have exposed a sophisticated mobile phishing campaign aimed at distributing an updated version of the notorious Antidot banking trojan.

According to Vishnu Pratapagiri, a researcher at Zimperium zLabs, fake recruiters are leveraging job offers to trick victims into downloading a malicious app. This app acts as a "dropper" to deliver an enhanced version of the malware, codenamed AppLite Banker, onto the victim’s Android device.


How the Scam Works

The attackers pose as recruiters and entice victims with job offers boasting a competitive hourly rate of $25 and promising excellent career growth.

1️⃣ Victims receive phishing emails or messages, often from fake companies like "Teximus Technologies."
2️⃣ Engaging with the fake recruiter leads to downloading a malicious Android app disguised as a legitimate employee CRM tool.
3️⃣ The app initially acts as a dropper, installing the full-fledged Antidot Banker on the victim's device.


Advanced Capabilities of the Malware

The updated version of Antidot Banker includes enhanced features such as:

  • Unlock PIN/Pattern Theft: Captures the unlock method (PIN, pattern, or password) of the device.
  • Remote Control: Allows attackers to take control of the infected device.
  • Accessibility Exploits: Abuses permissions to overlay screens, grant self-permissions, and carry out harmful activities.

Other dangerous functionalities include:

  • Credential Theft: Launches overlays to steal Google account credentials.
  • Banking Fraud: Displays fake login pages for 172 banks, cryptocurrency wallets, and popular apps like Facebook and Telegram.
  • Call and SMS Manipulation: Hides specific SMS messages, blocks calls, and enables call forwarding.
  • Keylogging: Tracks everything typed on the device.
  • VNC Functionality: Provides attackers with virtual control over the infected device.


Deceptive Tactics Used

The phishing app employs clever strategies to evade detection:

  • ZIP File Manipulation: Helps the app bypass analysis and security defenses.
  • Fake Google Play Store Prompts: Tricks users into granting permissions and installing updates.
  • External App Installation Warnings: Encourages victims to enable app installations from unknown sources under the guise of protecting their phone.


Global Targets and Implications

The campaign primarily targets users proficient in English, Spanish, French, German, Italian, Portuguese, and Russian.

Zimperium identified a network of fraudulent domains distributing the malware-laden APK files. The attackers’ sophisticated use of phishing and social engineering makes this a particularly dangerous threat to users worldwide.


Call to Action: Protect Yourself

Given the malware’s advanced capabilities and potential to cause severe financial losses, users are advised to:

  • Avoid downloading apps from unknown sources.
  • Be cautious of unsolicited job offers.
  • Regularly update their devices with the latest security patches.
  • Use trusted mobile security solutions to detect and prevent such threats.


Broader Cybersecurity Concerns

The findings also coincide with Cyfirma’s discovery of an Android malware campaign targeting high-value assets in Southern Asia using the SpyNote trojan. This further underscores the persistent threat of mobile malware and the need for proactive defense measures.

"The continuous use of tools like SpyNote by attackers demonstrates their preference for publicly available malware to target high-profile individuals," Cyfirma noted.

Stay vigilant and prioritize cybersecurity to safeguard your personal and financial data from these evolving threats.