ٹی بوٹ میلویئر گوگل پلے اسٹور میں ایک بار پھر دراندازی کرتا ہے
ٹیبٹ بینکنگ ٹروجن ایک بار پھر گوگل پلے اسٹور میں پایا گیا, where it posed as a QR code reader (QR Code & Barcode – Scanner) and managed to spread to more than 10,000 آلات. The malware targets users of more than 400 banking and financial applications, including those from Russia, China, and the United States.
According to a report from Cleafy, چائے کی بوٹ-infected applications act as droppers. That is, they get to the Google Play Store without malicious code and request minimal permissions from the user, so that it is difficult for reviewers and Google’s automated checks to detect anything suspicious.
اس کے علاوہ, trojanized applications actually work, delivering the promised functionality, so the reviews about them are mostly positive.

مثال کے طور پر, QR Code & Barcode – Scanner that was discovered in February, looked like a regular utility for scanning QR codes. البتہ, once installed, the app requested an update via a pop-up message, and instead of the standard procedure set by the Play Store rules, the update was downloaded from an external source.
The experts traced the source of these downloads to two گٹ ہب repositories owned by the user feleanicusor and containing several samples of the TeaBot malware, uploaded on February 17, 2022.

Attack scheme
Once this “update” is complete, TeaBot is downloaded to the victim’s device as a new QR Code Scanner: Add-On application. This application starts automatically and requests the rights to use Accessibility Services to perform the following functions:
- view the device screen and create screenshots that show login credentials, two-factor authentication codes, SMS content, اور اسی طرح;
- automatic granting of additional permissions to malware in the background, which does not require user intervention.

دلچسپ بات, earlier versions of TeaBot, discovered in January 2021 and studied by بٹ ڈیفینڈر, exited if they detected that the victim was in the United States. Now TeaBot also attacks users from the United States, and also received support for Russian, Slovak and Chinese languages, یعنی ہے, the malware attacks any users without making exceptions.
مجھے آپ کو یاد دلانے دو کہ ہم نے یہ بھی لکھا ہے Experts discovered زینومورف malware in the Google Play Store, اور یہ کہ AbstractEmu Android malware “roots” smartphones and evades detection.




