Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » New Android malware ‘Ajina.Banker’ steals financial data and bypasses 2FA via Telegram
Global Security

New Android malware ‘Ajina.Banker’ steals financial data and bypasses 2FA via Telegram

AdminBy AdminSeptember 12, 2024No Comments4 Mins Read
Android Malware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


September 12, 2024Ravi LakshmananMobile Security / Financial Fraud

Malicious programs for Android

Bank customers in the Central Asian region have been targeted by a new strain of code-named Android malware My class from at least November 2024 for the purpose of collecting financial information and intercepting two-factor authentication (2FA) messages.

Singapore-headquartered Group-IB, which discovered the threat in May 2024, said the malware was being distributed through a network of Telegram channels created by threat actors masquerading as legitimate applications related to banking, payment systems and government services. or daily utilities.

“The attacker has a network of affiliates motivated by financial gain that distributes the Android Banker malware targeting ordinary users,” security researchers Boris Martyniuk, Pavel Naumov and Anvar Anarkulov said.

The current campaign targets countries such as Armenia, Azerbaijan, Iceland, Kazakhstan, Kyrgyzstan, Pakistan, Russia, Tajikistan, Ukraine and Uzbekistan.

Cyber ​​security

There is evidence to suggest that some aspects of the Telegram-based malware distribution process could have been automated to improve efficiency. Many Telegram accounts are designed to serve up crafted messages that contain links – either to other Telegram channels or to external sources – and APK files to unwitting targets.

Using links that point to Telegram channels hosting malicious files has the added benefit of bypassing security measures and restrictions imposed by many community chats, allowing accounts to avoid bans when automatic moderation is triggered.

In addition to abusing users’ trust in legitimate services to maximize infection rates, the modus operandi also involves sharing malicious files in local Telegram chats, passing them off as giveaways and promotions that claim to offer lucrative rewards and exclusive access to services.

“Using themed posts and localized promotion strategies proved particularly effective in regional community chats,” the researchers note. “By adapting her approach to the interests and needs of the local population, Ajina was able to significantly increase the likelihood of successful infections.”

Threat actors have also been seen to bombard Telegram channels with multiple messages using multiple accounts, sometimes simultaneously, indicating a coordinated effort likely using some sort of automated distribution tool.

The malware itself is quite simple, as once installed it contacts a remote server and asks the victim to grant it permission to access SMS messages, phone number APIs, and information about the current cellular network, among other things.

Ajina.Banker is able to collect information about the SIM card, a list of installed financial programs and SMS messages, which are then transmitted to the server.

Newer versions of the malware are also designed to serve up phishing pages in an attempt to collect banking information. Additionally, they can access call logs and contacts, and abuse the Android Accessibility Services API to prevent deletion and grant themselves additional permissions.

Cyber ​​security

“The hiring of Java coders created by the Telegram bot with an offer to earn money also indicates that the tool is in the process of active development and has the support of a network of affiliated employees,” the researchers note.

“Analysis of file names, sample distribution methods, and other activities of attackers indicates cultural familiarity with the region in which they operate.”

The disclosure comes after Zimperium discovered links between two families of Android malware tracked as SpyNote and Gigabud (which is part of the GoldFactory family, which also includes GoldDigger).

“Domains with exactly the same structure (using the same unusual keywords as subdomains) and targets used to distribute the Gigabud samples were also used to distribute the SpyNote samples,” the company said in a statement. said. “This coincidence in distribution shows that the same person is likely behind both malware families, indicating a well-coordinated and widespread campaign.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025

Both Vextrio and affiliates control the global network

June 12, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025

Both Vextrio and affiliates control the global network

June 12, 2025

How to Decide Safety Expanding

June 12, 2025

The new tokenbreak attack combines AI moderation with a one -sided character change

June 12, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.