New DroidBot Malware Targets Cryptocurrency and Banking Apps in Europe

by | Dec 5, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

A new Android banking malware named DroidBot has surfaced, targeting credentials from over 77 cryptocurrency exchanges and banking apps across the UK, Italy, France, Spain, and Portugal.

Key Details

  • Discovered by Cleafy researchers, DroidBot has been active since June 2024 and operates as a malware-as-a-service (MaaS) platform.
  • Priced at $3,000 per month, DroidBot is being utilized by at least 17 affiliate groups, each customizing their payloads for specific regional and application targets.
  • Despite lacking sophisticated features, DroidBot has already caused 776 unique infections across Europe and Turkey. Researchers believe the malware is still under heavy development, with plans to expand into Latin America.

DroidBot MaaS Operation

DroidBot’s creators, believed to be Turkish, provide affiliates with:

  • Malware builders to create custom payloads.
  • Command and Control (C2) infrastructure for managing attacks.
  • A central administration panel for issuing commands and retrieving stolen data.
  • Access to documentation, support, and updates via Telegram.

Creators claiming DroidBot was tested on Android 14Creators claiming DroidBot works well on Android 14
Source: Cleafy

Features for Affiliates

  • Target customization (e.g., regional apps, language preferences).
  • Detailed control through an admin panel.
  • Support for inexperienced attackers, lowering the barrier for entry into cybercrime.

Affiliates extracted from the sample's configurationAffiliates extracted from the sample’s configuration
Source: Cleafy

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses



Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Infection Techniques

DroidBot disguises itself as trusted apps like Google Chrome, Google Play Store, or Android Security, tricking users into installation. Once installed, the malware leverages Android’s Accessibility Services to monitor user actions and simulate device interactions.

Admin panel giving affiliates complete controlAdmin panel giving affiliates complete control
Source: Cleafy

Core Capabilities:

  1. Keylogging – Captures all keystrokes entered by victims.
  2. Overlaying – Displays fake login pages over legitimate banking apps to steal credentials.
  3. SMS Interception – Hijacks incoming SMS messages, including one-time passwords (OTPs).
  4. Remote Control – A Virtual Network Computing (VNC) module allows attackers to remotely view and control devices, execute commands, and even darken screens to conceal malicious activity.


Apps Targeted

Among the 77 apps DroidBot targets, prominent examples include:

  • Cryptocurrency wallets: Binance, KuCoin, Metamask, Kraken.
  • Banking apps: Santander, BBVA, Unicredit, BNP Paribas, Credit Agricole, Garanti BBVA.

 

DroidBot's masking appsDroidBot’s masking apps
Source: Cleafy




Mitigation Recommendations

To reduce the risk of DroidBot infections:

  1. Only download apps from official sources like Google Play.
  2. Review app permissions carefully, especially those requesting Accessibility Services.
  3. Enable Google Play Protect and ensure it remains active.

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This