Trojan SharkBot Android يسرق العملات المشفرة ويخترق الحسابات المصرفية

Cleafy and ThreatFabric have discovered a new Android Trojan SharkBot that uses the Accessibility service to steal credentials from banking and cryptocurrency applications in Italy, the United Kingdom and the United States.

According to experts, the malware has been spreading since October 2021. The malware has not been seen in the official جوجل Play Store yet; instead, its operators seem to trick users into downloading and manually installing the application on their devices (side-loading). على سبيل المثال, it is known that SharkBot can disguise itself as a media player, streaming application, or data recovery applications.

Media Apps

After installing an application infected with SharkBot, the malware asks the user to grant it access to the Accessibility service. The malware uses the obtained rights to simulate screen touches and perform various malicious tasks, including: granting itself administrator rights, displaying fake login screens, keylogging, intercepting and hiding two-factor authentication SMS messages, as well as accessing banking and cryptocurrency applications for the purpose of transferring funds.

SharkBot is currently targeting 22 banking applications that are used in Italy and the UK, as well as five cryptocurrency related applications. في نفس الوقت, cybersecurity experts write that the malware is still in the early stages of development.

ATS

SharkBot’s primary goal is to initiate money transfers from compromised devices using Automatic Transfer Systems (ATS), bypassing multi-factor authentication mechanisms (such as SCA),” the report says. “After successfully installing SharkBot on a victim’s device, attackers can obtain confidential banking information by abusing the Accessibility service, including credentials, personal information, current balance, وما إلى ذلك وهلم جرا.

Bank App

According to experts, the use of Automatic Transfer Systems is consistent with the general trend that can be traced in the work of other banking Trojans for Android, including the Alien, EventBot, ميدوسا, Gustuff, Anatsa و FluBot البرمجيات الخبيثة.

دعني أذكرك أننا كتبنا ذلك أيضًا Newly discovered PhoneSpy Spyware Already Infected Over 1000 الهواتف, وذلك مجردةEmu تعمل البرامج الضارة التي تعمل بنظام Android على "جذور" الهواتف الذكية وتتجنب اكتشافها.

هيلجا سميث

كنت دائمًا مهتمًا بعلوم الكمبيوتر, خاصة أمن البيانات والموضوع, وهو ما يسمى في الوقت الحاضر "علم البيانات", منذ سنوات مراهقتي المبكرة. قبل الانضمام إلى فريق Virus Removal كرئيس تحرير, عملت كخبير في الأمن السيبراني في العديد من الشركات, بما في ذلك أحد مقاولي أمازون. تجربة أخرى: لقد حصلت على التدريس في جامعات أردن وريدينج.

اترك رد

هذا الموقع يستخدم Akismet للحدّ من التعليقات المزعجة والغير مرغوبة. تعرّف على كيفية معالجة بيانات تعليقك.

زر الذهاب إلى الأعلى