Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » New BingoMod Android banking trojan steals money, wipes devices
Global Security

New BingoMod Android banking trojan steals money, wipes devices

AdminBy AdminAugust 1, 2024No Comments3 Mins Read
Android Banking Trojan
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


August 1, 2024Ravi LakshmananBanking trojan / cyber fraud

Android banking trojan

Cybersecurity researchers have discovered a new Android Remote Access Trojan (RAT) called BingoMod which not only executes fraudulent money transfers from compromised devices, but also deletes them in an attempt to erase traces of the malware.

Italian cybersecurity firm Cleafy, which discovered the RAT in late May 2024, said the malware was under active development. He attributed the Android Trojan to a likely Romanian-speaking threat actor due to the presence of Romanian-language comments in the source code associated with early versions.

“BingoMod belongs to the current generation of mobile RAT malware, as its remote access capabilities allow threat actors (TA) to perform account takeover (ATO) directly from an infected device, thus using on-device fraud (ODF),” researchers Alessandro Stryna and Simone Mattia said.

Cyber ​​security

It should be noted here that this technique has been observed in other Android banking Trojans such as Medusa (aka TangleBot), Capybaraand TeaBot (aka Anatsa).

BingoMod like BROTHER, is also distinguished by its use of a self-destruct mechanism, which is designed to remove any evidence of fraudulent transmission on an infected device in order to hinder forensic analysis. Although this feature is limited to the device’s external storage, it is suspected that the remote access features can be used to initiate a hard factory reset.

Android banking trojan

Some of the identified programs are pretending to be antivirus tools and updates for Google Chrome. Once installed, the program prompts the user to grant it accessibility service permissions, using this to initiate malicious actions.

This involves executing a basic payload and locking the user from the home screen to collect information about the device, which is then transmitted to a server controlled by the attacker. It also abuses the Accessibility Services API to steal sensitive information displayed on the screen (such as credentials and bank account balances) and authorize itself to intercept SMS messages.

To initiate money transfers directly from compromised devices, BingoMod establishes a socket-based connection with the Command and Control Infrastructure (C2) to receive up to 40 commands remotely to take screenshots using Android Media Projection API and interact with the device in real time.

This also means that the ODF technique relies on an operator performing remittances of up to €15,000 (~$16,100) per transaction, as opposed to using an automated transfer system (AUS) to commit financial fraud on a large scale.

Another important aspect is the threat actor’s emphasis on evading detection using code obfuscation techniques and the ability to remove arbitrary programs from a compromised device, indicating that malware authors prefer simplicity over advanced features.

“In addition to real-time screen monitoring, the malware demonstrates phishing capabilities through Overlay Attacks and fake notifications,” the researchers said. “Unusual, overhead attacks are not launched when specific target programs are opened, but are initiated directly by the malware operator.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.