Experts discovered Xenomorph malware in the Google Play Store

ThreatFabric experts have discovered a new Xenomorph banking Trojan on the Google Play Store (the official Android app store) that attacks users from Spain, Portugal, Italy and Belgium.

The researchers describe the malware as a classic banker that infects Android devices, requests the rights to use the Accessibility service, and then uses them to display fake login screens, overlaying them on top of real banking applications.

Currently, Xenomorph can display such overlays for 56 banks in Spain, Portugal, Italy and Belgium, as well as 12 cryptocurrency wallets and 7 email apps.

Xenomorph on the Google Play Store

In addition, the malware collects other data about the device and transfers everything received to the cybercriminals’ control servers. The collected data is later used to access bank accounts and steal funds. If accounts are protected by two-factor authentication, Xenomorph is able to intercept SMS notifications and extract the necessary codes from them.

However, the most annoying thing in this situation is that Xenomorph is distributed through malicious applications in the Google Play Store and is delivered as a payload during the second stage of infection.

The surfacing of Xenomorph shows, once again, that threat actors are focusing their attention on landing applications on official markets. This is also a signal that the underground market for droppers and distribution actors has increased its activity.ThreatFabric specialists explain.

Xenomorph on the Google Play Store

So far, experts have found only one application distributing Xenomorph – Fast Cleaner, which was installed on more than 50,000 devices before being removed from the Google Play Store. The application contained the Gymdrop dropper, which successfully passed all Google checks, and after downloading to the victim’s device, it downloaded and installed more powerful malware – Xenomorph.

Although analysts write that Xenomorph is still at the development stage, but it already poses a serious threat, from which and new attacks can definitely be expected in the future. Moreover, there is an example of even more sly thing – fake VulkanRT library for Windows, that in fact contain rootkit.

It is worth noting that the name Xenomorph arose for a reason: experts noticed many signs in the code that linked the malware to the old Alien banking trojan. So, they decided to use a similar name, also inspired by the Alien movie series.

You might also be interested to know that FritzFrog botnet is active again and that Android malware Roaming Mantis attacks European users.

Helga Smith

I was always interested in computer sciences, especially data security and the theme, which is called nowadays "data science", since my early teens. Before coming into the Virus Removal team as Editor-in-chief, I worked as a cybersecurity expert in several companies, including one of Amazon's contractors. Another experience: I have got is teaching in Arden and Reading universities.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Back to top button