Tjekkisk Android Trojan efterligner QRecorder App

Tjekkisk Android Trojan efterligner QRecorder App

En ny tjekkisk Android Trojan er blevet opdaget, som har vist sig at udgive den QRecorder app. En erklæring fra politiet viser, at hacker eller gruppen bag det allerede har stjålet i løbet af 78 000 Euro from victim accounts.

Fake QRecorder App Turns out to be a Czech Android Trojan

This week the Czech Police reported that a new dangerous Android Trojan has been found out to be particularly active. Five victims from the Czech Republic are known so far to have been affected by it. The current samples are spread on various repositories as a fake copy of the QRecorder app. Successful installations from the Google Play repository alone number more than 10 000 forekomster. The impersonating app itself is a call recording solution, its description and attached screenshots showcase a typical entry having no suspicious elements.

Like other popular Android threats upon installation and first run it will request permissions to draw over other apps. When they have been granted the Czech Android Trojan will be able to control what is displayed to the user. This will trigger its built-in behaviour patterns, one of the first actions that are done is to report the infection to the criminal controllers. The analysis reveals that within 24 hours the infected devices will receive instructions. When no instructions are given the Android Trojan will not initiate any action.

relaterede Story: Botnet aktivitet i 2018 Viser øget distribution af rotter

The attackers have been found to use Firebase messages to communicate with the Trojan-infected devices. The slave malware QRecorder app will check for the presence of predefined banking apps. If none are found links will be found to encrypted payloads. The slave client will download them and decrypt the contents. Before the this step is initiated the user will asked additional permissions — to activate the Accessibility service. Through it the infection will be performed.

When the payload code is executed it will monitor for the download and launch of certain banking applications. A scam overlay will be created which will automatically harvest any credentials that are entered by the victim users.

The text strings that have been found in the Trojan’s source code reveal that the main targets appear to be Polish, Czech and German banks. So far two packages have been found to contain the Android Trojan:

  • com.apps.callvoicerecorder
  • gjfid.pziovmiq.eefff

The official statement can be tilgås her.


Martin Beltov

Martin dimitterede med en grad i Publishing fra Sofia Universitet. Som en cybersikkerhed entusiast han nyder at skrive om de nyeste trusler og mekanismer indbrud.

Flere indlæg - Websted

Følg mig:
TwitterGoogle Plus

Efterlad en kommentar

Din e-mail-adresse vil ikke blive offentliggjort. Krævede felter er markeret *

Frist er opbrugt. Venligst genindlæse CAPTCHA.

Del på Facebook Del
Loading ...
Del på Twitter Tweet
Loading ...
Del på Google Plus Del
Loading ...
Del på Linkedin Del
Loading ...
Del på Digg Del
Del på Reddit Del
Loading ...
Del på Stumbleupon Del
Loading ...