{"id":85390,"date":"2018-01-03T12:57:59","date_gmt":"2018-01-03T07:27:59","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=85390"},"modified":"2018-01-04T17:41:19","modified_gmt":"2018-01-04T12:11:19","slug":"android-banking-trojan-targets-232-apps-including-indian-banks","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/android-banking-trojan-targets-232-apps-including-indian-banks\/","title":{"rendered":"Android banking Trojan targets more than 232 apps including apps offered by Indian banks"},"content":{"rendered":"<p>Quick Heal Security Labs detected an Android Banking Trojan that targets more than 232 banking apps including those offered by Indian banks. The malware is known as <strong>Android.banker.A2f8a <\/strong>(Previously detected as\u00a0Android.banker.A9480).<\/p>\n<p>Like most other Android banking malware, even this one is designed for stealing login credentials, hijacking SMSs, uploading contact lists and SMSs on a malicious server, displaying an overlay screen (to capture details) on top of legitimate apps and carrying out other such malicious activities.<\/p>\n<p><strong>Infection vector<\/strong><\/p>\n<p><strong>Android.banker.A2f8a<\/strong> is being distributed through a fake Flash Player app on third-party stores. This is not surprising given that Adobe Flash is one of the most widely distributed products on the Internet. Because of its popularity and global install base, it is often targeted by attackers.<\/p>\n<p><strong>Technical analysis<\/strong><\/p>\n<p>After installing the malicious app, it will ask the user to activate administrative rights. And even if the user denies the request or kills the process, the app will keep throwing continuous pop-ups until the user activates the admin privilege. Once this is done, the malicious app hides its icon soon after the user taps on it.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_85391\" aria-describedby=\"caption-attachment-85391\" style=\"width: 248px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-85391\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/01\/Requesting_to_grant_device_administrator_rights-248x390.png\" alt=\"\" width=\"248\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Requesting_to_grant_device_administrator_rights-248x390.png 248w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Requesting_to_grant_device_administrator_rights-191x300.png 191w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Requesting_to_grant_device_administrator_rights.png 447w\" sizes=\"(max-width: 248px) 100vw, 248px\" \/><figcaption id=\"caption-attachment-85391\" class=\"wp-caption-text\">Fig 1: Requesting to grant device administrator rights<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_85392\" aria-describedby=\"caption-attachment-85392\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-85392\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/01\/Code_to_hide_the_app_icon-650x55.png\" alt=\"\" width=\"650\" height=\"55\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_hide_the_app_icon-650x55.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_hide_the_app_icon-300x25.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_hide_the_app_icon-768x65.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_hide_the_app_icon-789x67.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_hide_the_app_icon.png 1072w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-85392\" class=\"wp-caption-text\">Fig 2: Code to hide the app icon<\/figcaption><\/figure>\n<p>In the background, the app carries out malicious tasks \u2013 it keeps checking the installed app on the victim\u2019s device and particularly looks for 232 apps (banking and some cryptocurrency apps).<\/p>\n<p>If any one of the targeted apps is found on the infected device, the app shows a fake notification on behalf of the targeted banking app. If the user clicks on the notification, they are shown a fake login screen to steal the user\u2019s confidential info like net banking login ID and password.<\/p>\n<p>During our analysis, we found that the malware was capable of receiving and processing the following commands from the C&amp;C server:<\/p>\n<table style=\"height: 449px\" width=\"713\">\n<tbody>\n<tr>\n<td style=\"text-align: left\" width=\"164\">Send_GO_SMS<\/td>\n<td style=\"text-align: left\" width=\"399\">Send an SMS<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"164\">GetSWSGO<\/td>\n<td style=\"text-align: left\" width=\"399\">Collect all SMS from the device<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"164\">nymBePsG0<\/td>\n<td style=\"text-align: left\" width=\"399\">Upload list of contacts to a malicious server<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"164\">telbookgotext<\/td>\n<td style=\"text-align: left\" width=\"399\">Send SMS to all contacts with the text from its command<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"164\">StartAutoPush<\/td>\n<td style=\"text-align: left\" width=\"399\">Show fake notification<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"164\">RequestPermissionInj<\/td>\n<td style=\"text-align: left\" width=\"399\">ACCESSIBILITY Permission<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"164\">RequestPermissionGPS<\/td>\n<td style=\"text-align: left\" width=\"399\">GPS Permission<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"164\">killBot<\/td>\n<td style=\"text-align: left\" width=\"399\">Set all urls null in Shared Preferences<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"164\">getIP<\/td>\n<td style=\"text-align: left\" width=\"399\">Upload location to a malicious server<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"164\">ussd<\/td>\n<td style=\"text-align: left\" width=\"399\">Send a USSD request<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>1. Whenever the client receives the command &#8220;startAutoPush&#8221; from the server, it shows a fake notification with the targeted app\u2019s icon (title: &#8220;Urgent message!&#8221; &amp; text: &#8220;Confirm your account&#8221;). Clicking on the notification takes the user to a fake login page as discussed earlier.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_85393\" aria-describedby=\"caption-attachment-85393\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-85393\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/01\/Code_to_check_the_server_command-650x362.png\" alt=\"\" width=\"650\" height=\"362\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_check_the_server_command-650x362.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_check_the_server_command-300x167.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_check_the_server_command-768x427.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_check_the_server_command-789x439.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_check_the_server_command.png 1102w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-85393\" class=\"wp-caption-text\">Fig 3: Code to check the server command<\/figcaption><\/figure>\n<p>During the time of our analysis, the C&amp;C server was not functional; so, we were unable to monitor the dynamic activity of the app.<\/p>\n<figure id=\"attachment_85394\" aria-describedby=\"caption-attachment-85394\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-85394\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/01\/Code_to_load_the_phishing_page-650x295.png\" alt=\"\" width=\"650\" height=\"295\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_load_the_phishing_page-650x295.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_load_the_phishing_page-300x136.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_load_the_phishing_page-768x349.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_load_the_phishing_page-789x358.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_load_the_phishing_page.png 1159w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-85394\" class=\"wp-caption-text\">Fig 4: Code to load the phishing page<\/figcaption><\/figure>\n<p>2. The malware can intercept all incoming and outgoing SMSs from the infected device. This enables the attackers to bypass SMS-based two-factor authentication on the victim\u2019s bank account (OTP). The malware was also able to send SMSs with a dynamically received text and number from the server&#8217;s side.<\/p>\n<p>3. Whenever the client receives the command &#8220;<strong>GetSWSGO<\/strong>&#8221; from the server, it collects all SMSs stored on the device and uploads them to the malicious server.<\/p>\n<figure id=\"attachment_85395\" aria-describedby=\"caption-attachment-85395\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-85395\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/01\/Code_to_upload_SMS_to_server-650x276.png\" alt=\"\" width=\"650\" height=\"276\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_upload_SMS_to_server-650x276.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_upload_SMS_to_server-300x128.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_upload_SMS_to_server-768x327.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_upload_SMS_to_server-789x335.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_upload_SMS_to_server.png 962w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-85395\" class=\"wp-caption-text\">Fig 5: Code to upload SMS to server<\/figcaption><\/figure>\n<p>4. The malware can also set the device\u2019s ringer volume to silent in order to suppress SMS notifications:<\/p>\n<figure id=\"attachment_85396\" aria-describedby=\"caption-attachment-85396\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-85396\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/01\/Code_to_put_the_device_on_silent-650x62.png\" alt=\"\" width=\"650\" height=\"62\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_put_the_device_on_silent-650x62.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_put_the_device_on_silent-300x29.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_put_the_device_on_silent-768x73.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_put_the_device_on_silent-789x75.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_put_the_device_on_silent.png 878w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-85396\" class=\"wp-caption-text\">Fig 6: Code to put the device on silent<\/figcaption><\/figure>\n<p>5. Whenever the client receives a command &#8220;<strong>nymBePsG0<\/strong>&#8221; from the server, it uploads the victim\u2019s contacts to the malicious server.<\/p>\n<figure id=\"attachment_85397\" aria-describedby=\"caption-attachment-85397\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-85397\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/01\/Code_to_upload_contact_to_malicious_server-650x235.png\" alt=\"\" width=\"650\" height=\"235\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_upload_contact_to_malicious_server-650x235.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_upload_contact_to_malicious_server-300x108.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_upload_contact_to_malicious_server-768x277.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_upload_contact_to_malicious_server-789x285.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_upload_contact_to_malicious_server.png 1200w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-85397\" class=\"wp-caption-text\">Fig 7: Code to upload contact to malicious server<\/figcaption><\/figure>\n<p><strong>Targeted banking apps in India<\/strong><\/p>\n<p>The following is a list of the apps of the banks in India that are targeted by this Android Banking Trojan:<\/p>\n<ul>\n<li>axis.mobile (Axis Mobile)<\/li>\n<li>snapwork.hdfc (HDFC Bank MobileBanking)<\/li>\n<li>sbi.SBIFreedomPlus (SBI Anywhere Personal)<\/li>\n<li>hdfcquickbank (HDFC Bank MobileBanking LITE)<\/li>\n<li>csam.icici.bank.imobile (iMobile by ICICI Bank)<\/li>\n<li>snapwork.IDBI (IDBI Bank GO Mobile+)<\/li>\n<li>idbibank.abhay_card (Abhay by IDBI Bank Ltd)<\/li>\n<li>com.idbi (IDBI Bank GO Mobile)<\/li>\n<li>idbi.mpassbook (IDBI Bank mPassbook)<\/li>\n<li>co.bankofbaroda.mpassbook (Baroda mPassbook)<\/li>\n<li>unionbank.ecommerce.mobile.android (Union Bank Mobile Banking)<\/li>\n<li>unionbank.ecommerce.mobile.commercial.legacy (Union Bank Commercial Clients )<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_85398\" aria-describedby=\"caption-attachment-85398\" style=\"width: 457px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-85398\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/01\/Code_to_check_installed_banking_apps-457x390.png\" alt=\"\" width=\"457\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_check_installed_banking_apps-457x390.png 457w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_check_installed_banking_apps-300x256.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/Code_to_check_installed_banking_apps.png 594w\" sizes=\"(max-width: 457px) 100vw, 457px\" \/><figcaption id=\"caption-attachment-85398\" class=\"wp-caption-text\">Fig 8: Code to check installed banking apps<\/figcaption><\/figure>\n<p><strong>Targeted cryptocurrency apps<\/strong><\/p>\n<p>Apart from banking apps, <strong>Android.banker.A2f8a<\/strong> also targets the following cryptocurrency apps.<\/p>\n<ul>\n<li>bitfinex.bfxapp (Bitfinex)<\/li>\n<li>veken0m.cavirtex (Bitcoinium)<\/li>\n<li>brothas.mtgoxwidget (Bitcoin Ticker Widget)<\/li>\n<li>master.cointransaction (Bitcoin\/Altcoin chart, alarm, ticker)<\/li>\n<li>leowandersleb.bitcoinsw (Flux Bitcoin Widget)<\/li>\n<li>ozgur.btcprice (Bitcoin Price)<\/li>\n<li>coinprices.allexchanges (Crypto Prices All-in-One)<\/li>\n<li>blockchain.android (Blockchain &#8211; Bitcoin &amp; Ether Wallet)<\/li>\n<li>blockchain.merchant (Blockchain Merchant)<\/li>\n<li>hyperwallet.wubsprepaid (WUBS Prepaid)<\/li>\n<li>blocktrail.mywallet (BTC.com &#8211; Bitcoin Wallet)<\/li>\n<li>claimyourbits.btcsafari (BTC SAFARI &#8211; Free Bitcoin)<\/li>\n<li>handyapps.bitcoinpriceiq (Bitcoin Price IQ)<\/li>\n<li>schildbach.wallet (Bitcoin Wallet)<\/li>\n<li>blockfolio.blockfolio (Blockfolio Bitcoin \/ Altcoin App)<\/li>\n<li>org.freewallet.app (Bitcoin Wallet by Freewallet)<\/li>\n<li>bitcoin.crane.money (Bitcoin NewsCrane)<\/li>\n<li>coinmarketapp.app (Bitcoin CoinMarketCap.com (unofficial) \/ Altcoin)<\/li>\n<li>coinpayments.coinpaymentsapp (CoinPayments)<\/li>\n<li>org.freewallet.app (Bitcoin Cash Wallet by Freewallet)<\/li>\n<li>cenci7.coinmarketcapp (CoinMarketCapp &#8211; Blockchain Cryptocurrencies)<\/li>\n<li>benzneststudios.cryptostory (CryptoStory &#8211; Cryptocurrency Portfolio)<\/li>\n<li>langerhans.wallet (Dogecoin Wallet)<\/li>\n<\/ul>\n<p><strong>Other targeted banking apps<\/strong><\/p>\n<ul>\n<li>sberbankmobile<\/li>\n<li>sberbank.spasibo<\/li>\n<li>sberbank_sbbol<\/li>\n<li>sberbank.mobileoffice<\/li>\n<li>sberbank.sberbankir (Sberbank IR)<\/li>\n<li>alfabank.mobile.android<\/li>\n<li>alfabank.oavdo.amc<\/li>\n<li>st.alfa<\/li>\n<li>alfabank.sense<\/li>\n<li>alfadirect.app (Alfa-Direct)<\/li>\n<li>mw (Visa QIWI Wallet)<\/li>\n<li>raiffeisennews<\/li>\n<li>idamob.tinkoff.android (Tinkoff)<\/li>\n<li>tcsbank.c2c (Card 2 Card)<\/li>\n<li>tinkoff.mgp (Tinkoff Play: apply for a card)<\/li>\n<li>tinkoff.sme<\/li>\n<li>tinkoff.goabroad (FSSP FNS Russia)<\/li>\n<li>webmoney.my (WebMoney Keeper)<\/li>\n<li>rosbank.android (ROSBANK Online)<\/li>\n<li>vtb24.mobilebanking.android<\/li>\n<li>bm.mbm<\/li>\n<li>vtb.mobilebank (VTB Mobile)<\/li>\n<li>bssys.VTBClient (Mobile Client VTB)<\/li>\n<li>bssys.vtb.mobileclient (MobileClientVTB)<\/li>\n<li>simpls.mbrd.ui<\/li>\n<li>yandex.money<\/li>\n<li>simpls.brs2.mobbank<\/li>\n<li>akbank.android.apps.akbank_direkt (Akbank Direkt)<\/li>\n<li>akbank.android.apps.akbank_direkt_tablet (Akbank Direkt Tablet)<\/li>\n<li>akbank.softotp<\/li>\n<li>fragment.akbank<\/li>\n<li>ykb.android<\/li>\n<li>ykb.android.mobilonay<\/li>\n<li>ykb.avm<\/li>\n<li>ykb.androidtablet<\/li>\n<li>veripark.ykbaz<\/li>\n<li>softtech.iscek<\/li>\n<li>yurtdisi.iscep<\/li>\n<li>softtech.isbankasi<\/li>\n<li>monitise.isbankmoscow<\/li>\n<li>finansbank.mobile.cepsube<\/li>\n<li>enpara<\/li>\n<li>magiclick.FinansPOS (FinansPOS)<\/li>\n<li>matriksdata.finansyatirim (QNB Finansinvest)<\/li>\n<li>enpara.sirketim<\/li>\n<li>vipera.ts.starter.QNB (QNB Mobile)<\/li>\n<li>redrockdigimark (QNB National Day)<\/li>\n<li>garanti.cepsubesi (Garanti Mobile Banking)<\/li>\n<li>garanti.cepbank<\/li>\n<li>garantibank.cepsubesiro (GarantiBank)<\/li>\n<li>matriksdata.finansyatirim (QNB Finansinvest)<\/li>\n<li>mobinex.android.apps.cep_sifrematik<\/li>\n<li>garantiyatirim.fx (Garanti FX Trader)<\/li>\n<li>tmobtech.halkbank (Halkbank Mobil)<\/li>\n<li>SifrebazCep<\/li>\n<li>newfrontier.iBanking.mobile.Halk.Retail (Halkbank Mobile App)<\/li>\n<li>com.tradesoft.tradingsystem.gtpmobile.halk (Halk Trade)<\/li>\n<li>DijitalSahne.EnYakinHalkbank (Halkbank Nerede)<\/li>\n<li>ziraat.ziraatmobil (Ziraat Mobil)<\/li>\n<li>ziraat.ziraattablet (Ziraat Tablet)<\/li>\n<li>matriksmobile.android.ziraatTrader (Ziraat Trader)<\/li>\n<li>matriksdata.ziraatyatirim.pad (Ziraat Trader HD)<\/li>\n<li>comdirect.android (comdirect mobile App)<\/li>\n<li>commerzbanking.mobil (Commerzbank Banking App)<\/li>\n<li>consorsbank (Consorsbank)<\/li>\n<li>db.mm.deutschebank<\/li>\n<li>dkb.portalapp (DKB-Banking)<\/li>\n<li>de.dkb.portalapp<\/li>\n<li>ing.diba.mbbr2 (ING-DiBa Banking + Brokerage)<\/li>\n<li>postbank.finanzassistent (Postbank Finanzassistent)<\/li>\n<li>santander.de (Santander MobileBanking)<\/li>\n<li>fiducia.smartphone.android.banking.vr<\/li>\n<li>creditagricole.androidapp<\/li>\n<li>axa.monaxa<\/li>\n<li>banquepopulaire.cyberplus<\/li>\n<li>bnpparibas.mescomptes<\/li>\n<li>boursorama.android.clients<\/li>\n<li>caisseepargne.android.mobilebanking<\/li>\n<li>lcl.android.customerarea<\/li>\n<li>paypal.android.p2pmobile<\/li>\n<li>wf.wellsfargomobile<\/li>\n<li>wf.wellsfargomobile.tablet<\/li>\n<li>wellsFargo.ceomobile<\/li>\n<li>usbank.mobilebanking<\/li>\n<li>usaa.mobile.android.usaa<\/li>\n<li>suntrust.mobilebanking<\/li>\n<li>moneybookers.skrillpayments.neteller<\/li>\n<li>moneybookers.skrillpayments<\/li>\n<li>clairmail.fth<\/li>\n<li>konylabs.capitalone<\/li>\n<li>yinzcam.facilities.verizon<\/li>\n<li>chase.sig.android<\/li>\n<li>infonow.bofa<\/li>\n<li>bankofamerica.cashpromobile<\/li>\n<li>co.bankofscotland.businessbank<\/li>\n<li>grppl.android.shell.BOS<\/li>\n<li>rbs.mobile.android.natwestoffshore<\/li>\n<li>rbs.mobile.android.natwest<\/li>\n<li>rbs.mobile.android.natwestbandc<\/li>\n<li>rbs.mobile.investisir<\/li>\n<li>phyder.engage<\/li>\n<li>rbs.mobile.android.rbs<\/li>\n<li>rbs.mobile.android.rbsbandc<\/li>\n<li>co.santander.santanderUK<\/li>\n<li>co.santander.businessUK.bb<\/li>\n<li>sovereign.santander<\/li>\n<li>ifs.banking.fiid4202<\/li>\n<li>fi6122.godough<\/li>\n<li>rbs.mobile.android.ubr<\/li>\n<li>htsu.hsbcpersonalbanking<\/li>\n<li>grppl.android.shell.halifax<\/li>\n<li>grppl.android.shell.CMBlloydsTSB73<\/li>\n<li>barclays.android.barclaysmobilebanking<\/li>\n<li>ing.mobile (ING Bankieren)<\/li>\n<li>csob.smartbanking<\/li>\n<li>sberbankcz (Smart Banking)<\/li>\n<li>sporoapps.accounts<\/li>\n<li>sporoapps.skener (Platby)<\/li>\n<li>cleverlance.csas.servis24 (SERVIS 24 Mobilni banka)<\/li>\n<li>westpac.bank,nz.co.westpac<\/li>\n<li>com.suncorp.SuncorpBank (Suncorp Bank)<\/li>\n<li>stgeorge.bank (St.George Mobile Banking)<\/li>\n<li>banksa.bank (BankSA Mobile Banking)<\/li>\n<li>com.newcastlepermanent (NPBS Mobile Banking)<\/li>\n<li>com.nab.mobile (NAB Mobile Banking)<\/li>\n<li>com.mebank.banking (ME Bank)<\/li>\n<li>com.ingdirect.android (ING Australia Banking)<\/li>\n<li>be (ING Smart Banking)<\/li>\n<li>imb.banking2 (IMB.Banking)<\/li>\n<li>fusion.ATMLocator (People&#8217;s Choice Credit Union)<\/li>\n<li>com.cua.mb (CUA)<\/li>\n<li>commbank.netbank (CommBank)<\/li>\n<li>cba.android.netbank (CommBank app for tablet)<\/li>\n<li>citibank.mobile.au (Citibank Australia)<\/li>\n<li>citibank.mobile.uk (Citi Mobile UK)<\/li>\n<li>citi.citimobile<\/li>\n<li>bom.bank (Bank of Melbourne Mobile Banking)<\/li>\n<li>bendigobank.mobile (Bendigo Bank)<\/li>\n<li>doubledutch.hvdnz.cbnationalconference2016 (CB Conference 2017)<\/li>\n<li>com.bankwest.mobile (Bankwest)<\/li>\n<li>bankofqueensland.boq (BOQ Mobile)<\/li>\n<li>anz.android.gomoney (ANZ goMoney Australia)<\/li>\n<li>anz.android<\/li>\n<li>anz.SingaporeDigitalBanking<\/li>\n<li>anzspot.mobile<\/li>\n<li>crowdcompass.appSQ0QACAcYJ (ANZ Investor Tour)<\/li>\n<li>arubanetworks.atmanz (Atmosphere ANZ)<\/li>\n<li>quickmobile.anzirevents15 (ANZ Investor Relations Events)<\/li>\n<li>volksbank.volksbankmobile (Volksbank Banking)<\/li>\n<li>fiducia.smartphone.android.banking.vr (VR-Banking)<\/li>\n<li>volksbank.android<\/li>\n<li>secservizi.mobile.atime.bpaa (Volksbank per tablet)<\/li>\n<li>fiducia.smartphone.android.securego.vr (VR-SecureGo)<\/li>\n<li>isis_papyrus.raiffeisen_pay_eyewdg (Raiffeisen ELBA)<\/li>\n<li>easybank.mbanking (easybank)<\/li>\n<li>easybank.tablet (easybank app)<\/li>\n<li>easybank.securityapp (easybank Security App)<\/li>\n<li>bawag.mbanking (BAWAG P.S.K.)<\/li>\n<li>bawagpsk.securityapp (BAWAG P.S.K. Security App)<\/li>\n<li>psa.app.bawag (BAWAG P.S.K. SmartPay)<\/li>\n<li>pozitron.iscep<\/li>\n<li>vakifbank.mobile<\/li>\n<li>pozitron.vakifbank<\/li>\n<li>starfinanz.smob.android.sfinanzstatus (Sparkasse Ihre mobile Filiale)<\/li>\n<li>starfinanz.mobile.android.pushtan (S-pushTAN)<\/li>\n<li>entersekt.authapp.sparkasse (S-ID-Check)<\/li>\n<li>starfinanz.smob.android.sfinanzstatus.tablet<\/li>\n<li>starfinanz.smob.android.sbanking (Sparkasse+ Finanzen im Griff)<\/li>\n<li>palatine.android.mobilebanking.prod (ePalatine Particuliers)<\/li>\n<li>laposte.lapostemobile (La Poste &#8211; Services Postaux)<\/li>\n<li>laposte.lapostetablet (La Poste HD &#8211; Services Postaux)<\/li>\n<li>cm_prod.bad<\/li>\n<li>cm_prod.epasal (Epargne Salariale CM)<\/li>\n<li>cm_prod_tablet.bad<\/li>\n<li>cm_prod.nosactus<\/li>\n<li>societegenerale.mobile.lappli<\/li>\n<li>bbva.netcash (BBVA net cash)<\/li>\n<li>bbva.bbvacontigo (BBVA | Spain)<\/li>\n<li>bbva.bbvawallet (BBVA Wallet | Spain)<\/li>\n<li>bancosantander.apps (Santander)<\/li>\n<li>santander.app (Santander Brasil)<\/li>\n<li>cm.android (Bankia)<\/li>\n<li>cm.android.tablet (Bankia Tablet)<\/li>\n<li>bankia.wallet (Bankia Wallet)<\/li>\n<\/ul>\n<p><strong>Other targeted apps<\/strong><\/p>\n<ul>\n<li>amazon.mShop.android.shopping (Amazon Shopping)<\/li>\n<li>amazon.windowshop (Amazon for Tablets)<\/li>\n<li>ebay.mobile (eBay: Buy &amp; Sell. Explore Discount Shopping Deals)<\/li>\n<li>airbnb.android (Airbnb)<\/li>\n<li>scores365 (365Scores: Sports Scores Live)<\/li>\n<li>pyrsoftware.pokerstars.net (PokerStars Poker: Texas Holdem)<\/li>\n<li>pokerstars.cebo.psp (PokerStars Play: Free Texas Holdem Poker Game)<\/li>\n<li>paster<\/li>\n<li>pokerstars.eptguide (PokerStars Live)<\/li>\n<li>pkrstrs191 (PKRSTRS Mobile 2Day App)<\/li>\n<li>thunkable.android.avenue_mitm.Polonix<\/li>\n<li>westernunion.android.mtapp (Western Union US &#8211; Send Money Transfers Quickly)<\/li>\n<\/ul>\n<p><strong>Indicator of compromise<\/strong><\/p>\n<p>App Name: <em>Flash Player<\/em><br \/>\nPackage name: <em>yqyJqWdtdf.UOaOrquyRDgLFgGueha<\/em><br \/>\nMD5: <em>29cf5cc309c2e29b6afd63eb5ab8fbd2<\/em><br \/>\nSize: <em>115 KB<\/em><\/p>\n<p><strong>Quick Heal detection<\/strong><\/p>\n<p>Quick Heal successfully detects this Android Banking Trojan as <strong>Android.banker.A2f8a<\/strong><strong>.<\/strong><\/p>\n<p><strong>Important Note:<br \/>\n<\/strong>Adobe Flash player has been discontinued after Android 4.1 version as it&#8217;s available in the mobile browser itself. There is no official Adobe Flash Player available on the Google Play Store. Adobe had also announced that it will stop updating and distributing Flash player by the end of 2020 in all formats of browser.<\/p>\n<p><strong>\u00a0<\/strong><strong>Tips to stay safe from <\/strong><strong>Android Banking Trojans<\/strong><\/p>\n<ul>\n<li>Avoid downloading apps from third-party app stores or links provided in SMSs or emails.<\/li>\n<li>Always keep \u2018Unknown Sources\u2019 disabled. Enabling this option allows installation of apps from unknown sources.<\/li>\n<li>Most importantly, verify app permissions before installing any app even from official stores such as Google Play.<\/li>\n<li>Install a reliable <a href=\"https:\/\/bit.ly\/2isL3JA\">mobile security<\/a> app that can detect and block fake and malicious apps before they can infect your device.<\/li>\n<li>Always keep your device OS and mobile security app up-to-date.<\/li>\n<\/ul>\n<p><strong>Subject Matter Expert<\/strong><br \/>\nGajanan Khond| Quick Heal Security Labs<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quick Heal Security Labs detected an Android Banking Trojan that targets more than 232 banking apps including those offered by Indian banks. The malware is known as Android.banker.A2f8a (Previously detected as\u00a0Android.banker.A9480). Like most other Android banking malware, even this one is designed for stealing login credentials, hijacking SMSs, uploading contact lists and SMSs on a [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":85415,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[55,24,354],"tags":[1558,1559,378,987,1557],"class_list":["post-85390","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-android","category-malware","category-mobile-security-2","tag-android-banking-trojan","tag-banking-apps","tag-internet-security","tag-online-banking","tag-trojanbanker"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/85390"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=85390"}],"version-history":[{"count":19,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/85390\/revisions"}],"predecessor-version":[{"id":85420,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/85390\/revisions\/85420"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/85415"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=85390"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=85390"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=85390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}