Hey you,
BE IN THE KNOW!

35,000 ransomware infections per month and you still believe you are protected?

Sign up to receive:

  • alerts
  • news
  • free how-to-remove guides

of the newest online threats - directly to your inbox:


Acecard, Android Trojan and Phishing Tool Targets Over 30 Banks

Trojan-HorseIn terms of mobile malware, Android has been a primary target, attacked by various types of malicious software. From adware, to Trojans and ransomware, Android users should be extra cautious and should think about the protection of their devices, especially when new devastating threats emerge.

One quite dangerous Android threat that users should be aware of is the Acecard Trojan. First detected in 2014, Acecard is a perfect example of how malware, mobile malware included, evolves and becomes disastrous to its victims. When it was first ‘released’, Acecard was a simple piece of malicious code – a sniffer aiming at the collection of personal information. Collected data was then sent to the command and control server.

Back then, malware researchers weren’t particularly interested in Acecard, regarded as just another Android Trojan with nothing special to offer. However, the current state of Acecard proves that its developers not only didn’t give up but they also continued to improve its capabilities. As a result of their continuous efforts, Acecard is now a very effective phishing tool. So effective that in terms of what it can do, Acecard can easily be compared with its desktop brothers.

Learn about Phishing Attacks

A look into Acecard attacks

Acecard’s first attacks were registered in May 2015, when the Trojan targeted Australian banks. This is when the research team from Kaspersky Lab began observing the threat closely, analyzing its behavior. Back then, attacks on Australian banks were unusually high in number and frequency, and Kaspersky found out that a single banking Trojan was responsible. Acecard.

The Trojan is capable of performing almost any malware functionality currently available on the malware market. Acecard can steal a bank’s text and voice messages, it can simulate the official login page of the bank to try and steal users’ PII and account credentials. Acecard’s most recent version can also attack about 30 banks’ client applications and payment systems. Unfortunately, Trojans such as Acecard can overlay any app upon command, which means that the number of targets may even be bigger than 30.

The Kaspersky Lab team registered more than 6,000 attacks taking place between May and September 2015 and targeting German, Russian and Australian users. However, other banks were also compromised – French, Spanish, American, British, and Austrian.

Learn about Android Banking Malware

Not surprisingly, all these statistics add up to the biggest compilation of phishing interstitials in Android registered to this date.

According to security researchers, Acecard can successfully imitate 32 banking systems, PayPal included, plus the Google Play and Google Music payment screens. To make things ever worse, we should add the imitation of 17 Russian banks’ payment systems and their SMS-based verifications.

Not only does the Trojan affect multiple banks. Its range of capabilities incorporate social networks (Twitter, Facebook, Instagram), and services such as Gmail Android and instant messengers such as Skype, Viber and WhatsApp. Acecard attacks, involving any of these services, harvest login credentials which are then transferred to the criminal command and control server.

A look into Acecard’s distribution methods

The primary distribution channel is, not surprisingly, spam. Spam emails are tricking users to visit third-party app stores where the Trojan is most likely hiding. Acecard can also present itself as a version of Adobe Flash for Android, or as an Android porn app identified as PornoVideo.

Keep In Mind Android users should remember that Adobe put an end to the development of Android Flash in 2012. Any attempts prompting them to install Flash on their Android devices should serve as an indication of malicious intentions.

What to do, if your Android device was compromised by malware

The very first thing to remember is that antivirus protection is crucial to both your PC and your mobile device. In 2015, mobile malware was a huge problem to IT security, and as it turns out, things won’t be much different in 2016.

If your Android device became a victim to a mobile Trojan or ransomware, refer to the steps below. Also, make sure to leave a comment in the topic about Acecard in our security forums.

1. Back up the data on your device
2. Hard-reset your device and remove
3. Restore missing or corrupt files using special file restoration software

Milena Dimitrova

An inspired writer, focused on user privacy and malicious software. Enjoys 'Mr. Robot' and fears '1984'.

More Posts - Website

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.