Skip to main content

New Malware Strain Targets Android Mobile Banking

Apr 03, 2019
Photo credit: Getty Images/BigNazik

A new generation of malware that targets major banks, e-commerce sites and cryptocurrency services has been identified by Group-IB, a Russian cybersecurity firm.
 
The malware is known as Gustuff and operates on Android platforms. Group-IB warned that Gustuff can potentially target more than 100 banking apps, including 27 in the U.S.–Bank of America, Bank of Scotland, J.P.Morgan, Wells Fargo, Capital One, TD Bank and PNC Bank were among those cited in Group-IB’s report. Online payment service including PayPal and Western Union, along with cryptocurrency services including Bitcoin Wallet and Coinbase and e-commerce sites eBay and Walmart.com were among other potential targets.
 
Gustuff uses the Accessibility Service, intended to assist people with disabilities, to spread its digital mischief. Group-IB estimated that the malware was first developed in Russia and has been available since April 2018, and an upgraded version now sells for a monthly subscription in cybercriminal forums for $800.
 
“After being uploaded to the victim’s phone, the Gustuff uses the Accessibility Service to interact with elements of other apps’ windows including cryptocurrency wallets, online banking apps, messengers etc.,” the Group-IB researchers noted. “The Trojan can perform a number of actions, for example, at the server’s command, Gustuff is able to change the values of the text fields in banking apps. Using the Accessibility Service mechanism means that the Trojan is able to bypass security measures used by banks to protect against older generation of mobile Trojans and changes to Google’s security policy introduced in new versions of the Android OS.
 
“Moreover,” the researchers added, “Gustuff knows how to turn off Google Protect; according to the Trojan’s developer, this feature works in 70 percent of cases. Gustuff is also able to display fake push notifications with legitimate icons of the apps mentioned above. Clicking on fake push notifications has two possible outcomes: either a web fake downloaded from the server pops up and the user enters the requested personal or payment (card/wallet) details; or the legitimate app that purportedly displayed the push notification opens—and Gustuff at the server’s command and with the help of the Accessibility Service, can automatically fill payment fields for illicit transactions.”

 
About the author
Published
Apr 03, 2019
More from
Tech
Turning Free Knowledge Into Future Clients

Why webinars work

Jan 14, 2025
Flagstar Fined $3.5M For Misleading Statements After 2021 Cyberattack

The SEC issued a hefty penalty and cease-and-desist order, barring future misleading statements

Dec 20, 2024
The Mortgage Industry’s Cyber Blind Spot

As new cybersecurity regulations take effect, smaller companies lack visibility into their own organizations

Dec 16, 2024
Majority Of Homebuyers Have Concerns About Lender AI

60% of survey respondents said lender AI is a deal-breaker, Cloudvirga reports

Oct 23, 2024
Acrisure Welcomes Chief People Officer

Robin Benoit, who has served in an interim capacity since March 2024, takes on the role.

Sep 26, 2024
Simplist Technologies Officially Launches Sonar After Lengthy Beta Period

Sonar beta tested with over 200 lenders over the past year and a half.

Sep 25, 2024