New BianLian Trojan spies on data entry in Android banking applications

In the arsenal of criminal groups arrived a new version of the BianLian malware.

Cybercriminals modified the Trojan, equipping it with additional attack capabilities on banking applications.

Experts of the Fortinet company investigated in detail a new copy of the malware.

According to experts, BianLian can now save the screen of an Android device, which helps cybercriminals steal credentials of online banking users.

Bian Lian — is an ancient Chinese dramatic art
Bian Lian — is an ancient Chinese dramatic art
During the installation process, BianLian is trying to obtain permission to use features for people with disabilities (Accessibility Services). As soon as the user grants him access, the attack phase begins. The malicious program can record any windows of financial applications using a screencast module, for which BianLian requires separate rights in the Android system.

Thus, the entire process of entering a user name, password, and payment card data is recorded and passed into the hands of intruders.

Previously, BianLian served as a dropper for another malware – Anubis. Its initial characteristics allow bypassing the detection of various protective mechanisms. For example, BianLian may penetrate Google Play.

According to the Fortinet report, this is the list of attacked banking applications:

  • com.albarakaapp
  • com.btcturk
  • com.denizbank.mobildeniz
  • com.garanti.cepsubesi
  • com.ingbanktr.ingmobil
  • com.kuveytturk.mobil
  • com.magiclick.odeabank
  • com.mobillium.papara
  • com.pozitron.iscep
  • com.teb
  • com.thanksmister.bitcoin.localtrader
  • com.tmobtech.halkbank
  • com.ziraat.ziraatmobil
  • finansbank.enpara

BianLian seems to still be under active development. The added functionalities, even though not completely original, are effective and make this family a potentially dangerous one. Its code base and strategies put it on a par with the other big players in the banking malware space.

In addition, its new obfuscation technique, even though not very complicated, is still capable of tricking string-based detection, and would be very hard to detect with static analysis alone when encountered for the first time.

About Trojan Killer

Carry Trojan Killer Portable on your memory stick. Be sure that you’re able to help your PC resist any cyber threats wherever you go.

Check Also

MageCart on the Heroku Cloud Platform

Researchers Found Several MageCart Web Skimmers On Heroku Cloud Platform

Researchers at Malwarebytes reported about finding several MageCart web skimmers on the Heroku cloud platform …

Android Spyware CallerSpy

CallerSpy spyware masks as an Android chat application

Trend Micro experts discovered the malware CallerSpy, which masks as an Android chat application and, …

Leave a Reply