Authored by Neil Tyagi and Fernando Ruiz
In a digitally evolving world, the comfort of banking by means of cell functions has revolutionized monetary transactions. Nonetheless, this development has additionally opened doorways to a lesser-known adversary: Android phishing. Be a part of us as we delve into the clandestine realm of cyber threats concentrating on India’s banking sector.
This weblog uncovers the nuances of an Android phishing/banking trojan software recognized as Android/Banker.AFX which illustrates a typical process from cybercriminals designed to empty the financial institution accounts of their victims:
First, it broadcasts phishing messages through WhatsApp and lures customers to put in an app that carries malicious code hidden as a verification instrument. As soon as put in, the banking trojan can acquire private and monetary data and intercept SMS messages with the target of stealing one-time passwords or verification codes which can be required to finish transactions which can result in stealing the banking account belongings.
This trojan is only a variant and instance of a number of banking trojan implementations lately noticed within the wild that carry comparable dangers, which isn’t technically subtle however may be very efficient and prevalent particularly when it’s broadly distributed on social media. McAfee Cell Safety protects broadly and generically in opposition to any such banking trojans.
This weblog explores the insidious techniques, alarming tendencies, and preventive measures in opposition to the rising tide of phishing assaults plaguing Android customers in India’s monetary panorama.
Distribution Technique: Messaging platforms
The preliminary lure is an alarming WhatsApp message prompting the person to obtain an Android Package deal (APK) to finish a compulsory verification process carried out by monetary establishments referred to as Know Your Buyer (KYC) else the account can be blocked.

These seemingly harmless prompts, meticulously crafted by cybercriminals, possess a crafty sophistication that mirrors the reputable communication channels of banking establishments. They prey upon human curiosity, worry, and need, tricking customers into taking speedy actions that, at first look, appear innocuous however have far-reaching penalties.
Set up and execution
Because the app installer is triggered by Whatsapp, the set up by default needs to be blocked by Android except the person beforehand allowed the set up of unknown apps from this supply.
A warning is displayed after taping on the APK icon:


As soon as the Trojan is put in, the victims will get the monetary establishment icon on their Android app record:




The Captcha used right here is static. It doesn’t change ever as a result of all content material is hardcoded domestically.
As a part of the KYC validation lure course of, the malware collects delicate person data equivalent to:
- Full Identify, Date of Delivery
- Account, CIF, PAN, and Aadhar Numbers
- Bank card data


Moreover, this banking trojan intercepts SMS messages and abuses Firebase to speak with attackers. Through the evaluation the malware transmitted all collected data together with bank card data to:
wss[:]//s-usc1a-nss-2003.firebaseio.com/.ws?v=5&ns=zero-a4c52-default-rtdb
In line with the static evaluation, any obtained SMS message would even be exfiltrated to the attackers’ servers through the opened socket communication for the reason that app has granted SMS studying permissions on the first execution. That is applied to extract any OTP required to finish transactions of the sufferer.

Static Evaluation
- This malware requires widespread permissions nonetheless it’s necessary to spotlight that RECEIVE_SMS is a really harmful permissions that ought to solely be granted to apps which can be associated to messaging that you just belief. If apps put in from third-party sources require it, it’s a purple flag:
- INTERNET
- REQUEST_INSTALL_PACKAGES
- RECEIVE_SMS
- ACCESS_NETWORK_STATE
- Data collected by the phishing web site:
-
- username
- password
- telephone quantity
- date of delivery
- account quantity
- CIF quantity
- pan quantity
- debit card quantity
- CVV quantity
- atm pin
- The primary package deal goes by the title of hey.uwer.hey.hey.google.is.the.finest, which comprises the MainActivity for APK: The First oncreate perform prompts for SMS learn permission from the person, and when the person provides the permission, the person is greeted with the message “thanks -Crew SBI” or “We will’t confirm till you enable -Crew Financial institution”

-
- The learn message permission is required to watch any incoming messages, ideally OTPs, so these could be forwarded to the attacker to achieve entry to the account, bypassing any OTP-based 2-factor authentications.
- All incoming messages are saved to the database and later forwarded to the attacker.

-
- The Firebase configuration is saved within the APK together with the API key.

- The Firebase configuration is saved within the APK together with the API key.
-
- Debit/bank card data is being submitted utilizing Firebase.

- Debit/bank card data is being submitted utilizing Firebase.
- The person’s Aadhar quantity, CIF (buyer data file), and person data are collected and submitted to Firebase.
Telemetry And Security by Mcafee
- McAfee Cell Safety proactively protects in opposition to this risk as Android/Banker.AXF!ML.
- McAfee has prevented over 360 gadget infections of Android/Banker.AXF!ML within the final 30 days. India underscores the acute risk posed by this banking malware throughout the nation’s digital panorama, with a couple of hits discovered elsewhere on the earth, presumably from Indian SBI customers Residing in Different Nations.
Android/Banker.AXF!ML infections world wide: India is the goal.
- The proactive stance taken by McAfee in opposition to Android/Banker.AXF!ML underscores its dedication to shielding customers from the ever-evolving panorama of Android-based phishing and banking threats, emphasizing the significance of strong cybersecurity measures in safeguarding the integrity of non-public monetary knowledge.
Conclusion
Banking trojans aren’t new or subtle however they’re a persistent risk as a result of profitable enterprise that poses for malware authors which might lure many victims who’re unaware of the danger of phishing. As these campaigns could be large even when a small proportion of focused victims fall the criminals can have a big loot.
Cybercriminals are consistently bettering their social engineering tips to lure customers into phishing and malware. The primary line of protection in opposition to these threats is the person’s consciousness. We suggest:
- Keep away from putting in apps from third-party sources, particularly apps obtained by messaging apps.
- Don’t activate “set up unknown apps” possibility on social media apps.
- Don’t belief or click on on messages obtained from untrusted sources on social media.
- For banking apps keep on with the official web site and official app shops
- If attainable, use a dependable antivirus answer equivalent to McAfee Cell Safety which generically protects in opposition to a lot of these threats.
McAfee Antivirus emerges as a formidable ally within the battle in opposition to Android phishing inside India’s banking sector. With its strong suite of safety features tailor-made for cell gadgets, McAfee stands as a bulwark, offering essential protection mechanisms in opposition to the ever-mutating panorama of cyber threats.
Indicators of Compromise
| Hash | Package deal |
| 7cfc6360e69d22b09a28c940caf628959d11176e27b8a03e15b020b369569415 | hey.uwer.hey.hey.google.is.the.finest |
| b067f5903e23288842ad056d4b31299b3b30052abe69bee236136b2b9fcab6a8 | hey.uwer.hey.hey.google.is.the.finest |
| e2e097ef433be75dcab830baa4b08feb4a24267c46b568fd4aef00dbb081ed8f | hey.uwer.hey.hey.google.is.the.finest |
| 9f046f769760d52a97680a91fd511f1e86c428b9eec27d7eb486b7b4d0666f0b | hey.uwer.hey.hey.google.is.the.finest |
| 1c69b0a69ed1631a1f1b54627a9b5dac3b214a275280de36d05ee75021cbfb04 | hey.uwer.hey.hey.google.is.the.finest |
| 495ab4efd3d1ec9bfc2d08d80df316aad20dc76e625374627fabea06f5151584 | hey.uwer.hey.hey.google.is.the.finest |
| 6190144b56e06af8aeeeba2104a665a555d01f6ec2a22ba78212d943ac2b258d | hey.uwer.hey.hey.google.is.the.finest |
| 6c6ea9fbeae967fb53ab9984edda9b754fb6d3f85b4ff5b14e1fd33399362ba4 | hey.uwer.hey.hey.google.is.the.finest |
Abused Firebase host : Wss[:]//s-usc1a-nss-2003.firebaseio.com/.ws?v=5&ns=zero-a4c52-default-rtdb