Rewterz Threat Alert – Android Malware FakeSpy Being Distributed by SMS Messages
July 7, 2020Rewterz Threat Alert – Group Targeting Executives via Phishing Campaigns for over a year
July 7, 2020Rewterz Threat Alert – Android Malware FakeSpy Being Distributed by SMS Messages
July 7, 2020Rewterz Threat Alert – Group Targeting Executives via Phishing Campaigns for over a year
July 7, 2020Severity
High
Analysis Summary
Cerberus banking Trojan disguised itself as a genuine app in order to access the banking details of unsuspecting users and is targeting users in Spain. It made to the google store as a ‘Genuine APP” posed as a Spanish currency converter called “Calculadora de Moneda”. The app did not show any signs of harm after being approved on the play store and after months of gaining trust of the users and downloads, the app then triggered dormant code that became a dropper for the Cerberus Trojan. Once executed, the APK dropped Cerberus, a relatively new Trojan that has been in circulation since June 2019.
The malware creates an overlay across existing banking and financial apps. Cerberus will lurk in the background, waiting for a user to input their account credentials, of which this information is then stolen and sent to the attacker’s C2. The app is sophisticated enogh to read one time password (OTP) as well as grab two-factor authentication (2FA) details. These security measures are intended to further protect our online banking sessions.
Impact
- Financial loss
- Exposure of sensitive data
Indicators of Compromise
IP
- 23[.]106[.]124[.]183
MD5
- 8a3b7815fd4872a217a1c2f57bedc0cb
SHA-256
- c30ebf9fc47e6e12f4467e32bf1b3c055f99659c8c0395df4b3e7107591eb5fa
SHA1
- 7909191229efeedd79aed7b5625dbc2f98267136
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment.