Kaspersky uncovers banking malware on the prowl in APAC
With the continued uptick in the adoption of mobile banking in Asia Pacific (APAC), global cybersecurity company Kaspersky warns of more attacks against Android and iOS devices.
Particularly, active monitoring shows the notorious Anubis Trojan now delivers a combination of mobile banking Trojan with ransomware functionalities to its target smartphones.
Mobile banking Trojans are one of the most dangerous species in the malware world. This type of threat steals money from mobile users bank accounts usually by disguising the Trojans as legitimate apps to lure people into installing the malware.
Anubis is a mobile banking Trojan targeting Android users as early as 2017. This malware family continues to be one of the most common mobile bankers, according to Kaspersky's latest mobile statistics in the second quarter of 2022.
In this period, one in 10 (10.48%) of unique Kaspersky users globally who encountered a banking threat has encountered Anubis mobile banking Trojan.
Initial infections are done through multiple ways legitimate-looking and high-ranking but malicious apps available on Google Play, smishing (phishing messages sent through SMS), and Bian malware, another mobile banking Trojan.
Once in, this infamous mobile banker can do a complete device takeover. It can steal personal information and identity, access private messages and login credentials, record sound, request GPS, disable play protect, lock the devices screen, and more.
Suguru Ishimaru, Senior Malware Researcher for Global Research and Analysis Team (GReAT) at Kaspersky, says, "Anubis is known for compromising hundreds of bank customers per campaign, proving that its among the most active malware targeting Android users right now.
"Our recent findings show that the cyber criminals behind this threat have started implementing ransom functionalities. If this modification proves to be successful, chances are other malicious groups will copy the same technique of stealing data and holding devices hostage.
"As a result, I expect to see more of such attacks in APAC due to cybercriminals strong financial motivation."
Another prolific threat actor targeting mobile banking users, globally and in the APAC region, is Roaming Mantis. The group carries out malicious campaigns that target Android devices and spreads mobile malware initially via DNS hijacking and currently through smishing.
Kaspersky experts have been tracking its operations since 2018 and detected almost half a million attacks in APAC from 2021 to the first half of 2022.
Ishimaru also underlined that while the cybercriminal group is known for targeting Android devices, Roaming Mantis recent campaign showed interest in iOS users.
Using the same techniques, the smishing messages targeting iOS users contain a very short description and a URL to a landing page. If a user clicks on the link and opens the landing page, there are two scenarios: iOS users are redirected to a phishing page imitating the official Apple website, while the Wroba malware is downloaded on Android devices.
If a victim inputs his credentials to the phishing website, it will then proceed to the 2FA (two-factor authentication) phishing website. This allows the attacker to know the users device, credentials, and 2FA codes.
Ishimaru adds, "There is a notion that iOS is a more secure operating system. However, we must take two things into account the increasing sophistication of mobile bankers social engineering techniques and malware arsenal and the possibility for human errors. Remember that both Anubis and Roaming Mantis require users participation before they can take over a device.
"With more than half (63%) of digital payments in APAC doing their financial transactions online through mobile devices, awareness is no longer enough. Protecting our smartphones is a step that everyone should be doing by now."
Kaspersky expert suggests two layers of protection for smartphones:
- Basic security: Keep phones up to date and install the latest patches, reboot daily, do not trust third party apps and mobileconfig, never click on links sent through SMS, and install a security solution.
- Advanced protection: Use a VPN to mask your traffic, check live network traffic using live Indicator of Compromise (IOCs), and use Lockdown Mode for iOS 16 users.