Home > Cyber News > BankBot Android Trojan Targets 428 Legitimate Banking Apps
CYBER NEWS

BankBot Android Trojan Targets 428 Legitimate Banking Apps

BankBot is back, once again bypassing the security measures of Google Play Store. The banking Trojan landed for the first time in January this year, when attackers used the source code of an unnamed Android banker. Attackers took the code and transformed it into BankBot. Research indicates that the Trojan has been used in attacks on banks in Russia, the UK, Austria, Germany, and Turkey.

BankBot New Campaigns Detected Plaguing Play Store

BankBot has also been upgraded to conceal itself so that it avoids Google’s security scanner. Three different active campaigns have already been detected and taken down. In other words, Google has taken measures and has removed the infected apps carrying BankBot.

Related Story: Sathurbot Trojan, Another Reason Not to Download Torrents

But as it often happens in the malware world, attackers were quick to react and replaced the eliminated apps with new ones. According to Securify, two new BankBot campaigns have been created and have once again bypassed Google’s security checks, meaning they could be found in the Play Store.

428 Legitimate Banking Apps Targeted

Securify has shared a list with 428 legitimate banking apps specifically targeted by the most recent versions of BankBot. The list contains bank names such as Santander, ING, Erste, Volksbank, Eurobank, ABN AMRO, BNP Paribas, Garanti, etc. Have a look at the full list.

For the infection to take place, BankBot would show a fake window on top of one of the legitimate banking apps listed above. Not surprisingly, the Trojan’s purpose is to harvest login credentials for the same banking apps. However, the malware can also intercept the user’s text messages, lock their device or even bypass two-step verification.

Related Story: Acecard, Android Trojan and Phishing Tool Targets Over 30 Banks

Unfortunately, the malware can be deployed against other popular apps such as Facebook, YouTube, Snapchat, WhatsApp, Twitter, and even Google Play Store alone. Android users should be extra careful as they are targeted too often by malicious pieces designed to steal their login credentials. Once these details are in the hands of attackers, things can get really scary.

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:
Twitter

Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree