New Mobile Phishing Scheme Targets Android Users with Enhanced Antidot Trojan
Sophisticated Mishing Campaign Unveiled
Cybersecurity experts have discovered a new mobile phishing (mishing) attack aimed at distributing an advanced version of the Antidot banking malware. This marks the first time such a campaign has been identified by researchers in the field.
You might be interested in: Understanding Phishing Attacks | Cybersecurity Awareness Training CHAPTER 1
How the Attack Works
Vishnu Pratapagiri, a researcher from Zimperium zLabs, explained in a recent study, “The attackers pose as recruiters, enticing victims with fake job offers.” The phishing strategy involves tricking individuals into downloading a malicious app during the fake hiring process. This app acts as a dropper, leading to the installation of the latest Antidot Banker variant on the victim’s Android device.
Details of the AppLite Banker Malware
The upgraded malware, named AppLite Banker by mobile security firms, can remotely control infected phones and steal the PIN, pattern, or password used to unlock them. Similar features were observed in the TrickMo malware.
Social Engineering Tactics
The campaign uses various social engineering methods, often promising a “$25 hourly rate” and good career growth to attract victims. According to a Reddit post uncovered by The Hacker News in September 2024, many users received emails from a fake company called Teximus Technologies, offering remote customer care jobs.
Infection Process
Victims interacting with these fake recruiters are directed to download a harmful Android app from a phishing website. This app serves as the initial stage, enabling the main malware to infect the device.
Zimperium identified a network of fake domains spreading malware-infected APK files disguised as employee CRM applications. To bypass security checks, the dropper apps manipulate ZIP files and prompt users to create an account. They then display a message urging users to update the app to “protect their phone” and advise enabling installations from third-party sources.
“When users click the ‘Update’ button, a fake Google Play Store icon appears, leading to the malware installation,” Pratapagiri added.
Capabilities of the Malicious Software
Like its predecessor, the new malware requests Accessibility Services permissions and abuses them to overlay the device screen and perform harmful actions. These include:
- Granting unauthorized rights for additional malicious activities
- Launching “Keyboard & Input” settings
- Interacting with the lock screen based on the device’s security settings
- Waking up the device and dimming the screen
- Displaying overlays to steal Google account details
- Preventing the malware from being uninstalled
The latest Antidot version also supports new commands, allowing it to:
- Hide specific SMS messages
- Block calls from selected numbers via a remote server
- Open “Manage Default Apps” settings
- Provide fake login pages for 172 different financial institutions, cryptocurrency wallets, and social media platforms like Facebook and Telegram
Additional features include keylogging, call forwarding, SMS theft, and remote access through Virtual Network Computing (VNC).
Target Audience
The phishing ads primarily target users who speak English, Spanish, French, German, Italian, Portuguese, and Russian.
Recommendations for Users
Pratapagiri emphasized, “Given the malware’s advanced capabilities and extensive control over compromised devices, it is crucial to implement strong protection measures to defend against this and similar threats to prevent data or financial loss.”
Related Malware Threats
At the same time, Cyfirma reported an Android malware campaign in Southern Asia delivering the SpyNote trojan, targeting high-value assets. No specific threat actors have been identified yet. Cyfirma noted, “The ongoing use of SpyNote shows that attackers prefer this tool to target high-profile individuals, even though it’s available on various underground forums and Telegram channels.”
Stay Protected
To protect your device from such threats:
- Avoid downloading apps from unknown sources
- Verify the legitimacy of job offers and recruiters
- Keep your device’s software updated
- Use reputable security software to detect and block malware
Stay vigilant and safeguard your personal information against evolving mobile threats.