Vultur banking malware reappears with many dangerous features
Researcher Joshua Kamp (NCC Group), said: 'Vultur has encrypted communication information between the control server (C2 server) and infected devices, impersonating legitimate applications to perform many harmful actions'.
When communication between the control server and the victim's device is encrypted, the transmitted data becomes harder for security systems to read and analyze, making it difficult to detect and prevent malicious activities. harm becomes more difficult.
What is Vultur banking malware?
Vultur is one of the first Android banking malware families with screen recording capabilities, primarily targeting banking applications to record keystrokes and remote controls. Vultur was first discovered by ThreatFabric in late March 2021.
This malware was observed to be distributed through trojanized droppers on Google Play, masquerading as authenticator apps and productivity apps to trick users into installing them.
As observed by NCC Group, dropper applications use a combination of SMS messages and phone calls to spread malware. Once installed by the user, the dropper will execute 3 related payloads (2 APKs and 1 DEX file) register the bot with the C2 server, obtain accessibility service permissions for remote access via AlphaVNC, and ngrok, while also running commands fetched from the C2 server.
One of Vultur's new features is the ability to remotely interact with an infected device, including performing clicks, scrolls, and swipes through Android accessibility services, as well as downloading, uploading, and swiping. delete, install and find files.
Additionally, the malware prevents victims from interacting with a predefined list of apps, displays custom notifications in the status bar, and even disables Keyguard to bypass screen security measures. lock up.
Vultur improves remote control
Kamp said: 'Vultur's recent developments have demonstrated a shift in focus towards maximizing remote control of infected devices. With the ability to dictate scrolling, swiping, clicking, controlling volume, blocking app launches, and even incorporating file management functionality, it's clear that the main goal is to gain full control over compromised devices. '
This development comes as Team Cymru revealed the transition of Android banking trojan Octo (also known as Coper) to operating as a service, providing malware for other threat actors to conduct. information theft.
'This malware offers many advanced features, including keystroke logging, blocking SMS messages and push notifications, and controlling the device's screen,' the company said.
Octo's campaigns are estimated to have compromised 45,000 devices, mainly spread across Portugal, Spain, Türkiye and the United States. Some other victims were in France, the Netherlands, Canada, India and Japan.
Broadcom-owned Symantec said in a news release that the malware 'targets stealing banking information, SMS messages and other confidential information from victims' devices'.
You should read it
- There is an Edge Chromium browser, invite download and experience
- What is special about E5 bio-finisher RON 92?
- Instructions for creating new Apple ID on PC or Mac using iTunes
- What is Binomo? How to register Binomo like?
- How to change iPhone wallpaper automatically when rotating the screen
- Lenovo stopped selling netbooks online
- Is backup and storage a must?
- The bright side of P2P
May be interested
- The 4 most common ways to spread malware todayif there's one thing that poses a threat to all users of technology, it's malware. this malware can be extremely dangerous, harmful, and comes in many different forms.
- How to check if your PC is infected with Emotet malwareemotet is a really nasty type of malware that has been around for years. it was a banking trojan that sneaked into a victim's computer and stole their financial information.
- The laptop contains six of the world's most dangerous malware being auctioned, starting at $ 268,000a samsung nc10-14g 10.2-inch blue netbook laptop containing the most dangerous malware ever developed, named the persistence of chaos, is auctioned off with a starting amount of up to usd 268,000.
- Malware using machine learning technology, downloaded more than 240,000 times by Android userssparkcat has several notable features that make its spread more dangerous than ever.
- Instructions to cancel SMS Banking VietinBank are very simplecurrently, most banks have their own banking applications, so sms banking is not necessary. below is a guide to cancel sms banking vietinbank.
- 5 ways malware can easily infect a Macthere are actual mac security threats and many problems resulting from user behavior. here are some dangerous practices that can infect malware on a mac.
- Banks warn of fraudulent ways through electronic banking transactionsrecently, two joint stock commercial banks, maritimebank and vietbank, have warned their customers about fraudulent transactions via electronic banking channels.
- Warning with 4 dangerous variants of WannaCry malwarethe malicious code wannacry crippled the worldwide network in just a few hours after it appeared. in addition, 4 variants of wannacry malicious code are equally dangerous.
- CD burning application suddenly 'reappears' on Windows 11 with 64-bit versionremember the time when cds or compact discs were popular data storage devices?
- Opening a dangerous malware store can clean up your bank account on the black webusually you have to exploit vulnerabilities in software or hardware to hack atm accounts but now things are much simpler, just buying a malware will grab millions right away.