Home » News » New BianLian Trojan spies on data entry in Android banking applications

New BianLian Trojan spies on data entry in Android banking applications

In the arsenal of criminal groups arrived a new version of the BianLian malware.

Cybercriminals modified the Trojan, equipping it with additional attack capabilities on banking applications.

Experts of the Fortinet company investigated in detail a new copy of the malware.

According to experts, BianLian can now save the screen of an Android device, which helps cybercriminals steal credentials of online banking users.

Bian Lian — is an ancient Chinese dramatic art
Bian Lian — is an ancient Chinese dramatic art
During the installation process, BianLian is trying to obtain permission to use features for people with disabilities (Accessibility Services). As soon as the user grants him access, the attack phase begins. The malicious program can record any windows of financial applications using a screencast module, for which BianLian requires separate rights in the Android system.

Thus, the entire process of entering a user name, password, and payment card data is recorded and passed into the hands of intruders.

Previously, BianLian served as a dropper for another malware – Anubis. Its initial characteristics allow bypassing the detection of various protective mechanisms. For example, BianLian may penetrate Google Play.

According to the Fortinet report, this is the list of attacked banking applications:

  • com.akbank.android.apps.akbank_direkt
  • com.albarakaapp
  • com.binance.dev
  • com.btcturk
  • com.denizbank.mobildeniz
  • com.finansbank.mobile.cepsube
  • com.garanti.cepsubesi
  • com.ingbanktr.ingmobil
  • com.kuveytturk.mobil
  • com.magiclick.odeabank
  • com.mobillium.papara
  • com.pozitron.iscep
  • com.teb
  • com.thanksmister.bitcoin.localtrader
  • com.tmobtech.halkbank
  • com.vakifbank.mobile
  • com.ykb.android
  • com.ziraat.ziraatmobil
  • finansbank.enpara
  • tr.com.hsbc.hsbcturkey
  • tr.com.sekerbilisim.mbank
Conclusion

BianLian seems to still be under active development. The added functionalities, even though not completely original, are effective and make this family a potentially dangerous one. Its code base and strategies put it on a par with the other big players in the banking malware space.

In addition, its new obfuscation technique, even though not very complicated, is still capable of tricking string-based detection, and would be very hard to detect with static analysis alone when encountered for the first time.

READ  Infected by WannyCry and MyDoom laptop costs more than $1 million
[Total: 0    Average: 0/5]

About Trojan Killer

Carry Trojan Killer Portable on your memory stick. Be sure that you’re able to help your PC resist any cyber threats wherever you go.

Check Also

Emotet trojan

Global Threat Index: Emotet botnet suspended its activities

Check Point Research team (a division of Check Point Software Technologies) published a Global Threat …

wordpress

Vulnerability in the plugin for WordPress allowed to execute PHP-code remotely

Information security specialists from Wordfence have found the vulnerability of the Ad Inserter plugin for …

Leave a Reply