Close Menu
Technology News & TrendsTechnology News & Trends

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Spies hack Wi-Fi networks in far-off land to launch attack on target next door

    December 2, 2024

    QNAP firmware update leaves NAS owners locked out of their boxes

    December 2, 2024

    Found on VirusTotal: The world’s first UEFI bootkit for Linux

    December 2, 2024
    Facebook X (Twitter) Instagram
    Technology News & TrendsTechnology News & Trends
    Facebook X (Twitter) Instagram
    SUBSCRIBE
    • Home
    • Biz & IT

      Spies hack Wi-Fi networks in far-off land to launch attack on target next door

      December 2, 2024

      QNAP firmware update leaves NAS owners locked out of their boxes

      December 2, 2024

      Found on VirusTotal: The world’s first UEFI bootkit for Linux

      December 2, 2024

      Code found online exploits LogoFAIL to install Bootkitty Linux backdoor

      December 2, 2024

      Google and Kairos sign nuclear reactor deal with aim to power AI

      December 2, 2024
    • Science

      Spies hack Wi-Fi networks in far-off land to launch attack on target next door

      December 2, 2024

      QNAP firmware update leaves NAS owners locked out of their boxes

      December 2, 2024

      Found on VirusTotal: The world’s first UEFI bootkit for Linux

      December 2, 2024

      Code found online exploits LogoFAIL to install Bootkitty Linux backdoor

      December 2, 2024

      Google and Kairos sign nuclear reactor deal with aim to power AI

      December 2, 2024
    • Technology

      “Havard”-trained spa owner injected clients with bogus Botox, prosecutors say

      November 22, 2024

      The next Starship launch may occur in less than two weeks

      November 22, 2024

      For fame or a death wish? Kids’ TikTok challenge injuries stump psychiatrists

      November 22, 2024

      Nearly three years since launch, Webb is a hit among astronomers

      November 22, 2024

      Airborne microplastics aid in cloud formation

      November 22, 2024
    • Gaming

      Bazzite is the next best thing to SteamOS while we wait on Valve

      November 20, 2024

      Halls of Torment is Diablo cranked up to 50,000 kills/hour

      November 20, 2024

      GOG’s Preservation Program is the DRM-free store refocusing on the classics

      November 20, 2024

      How Valve made Half-Life 2 and set a new standard for future games

      November 20, 2024

      Dragon Age: The Veilguard and the choices you make while saving the world

      November 20, 2024
    • Gadgets

      Apple’s first Mac mini redesign in 14 years looks like a big aluminum Apple TV

      November 20, 2024

      GitHub Copilot moves beyond OpenAI models to support Claude 3.5, Gemini

      November 20, 2024

      Microsoft finally releases generic install ISOs for the Arm version of Windows

      November 20, 2024

      I, too, installed an open source garage door opener, and I’m loving it

      November 20, 2024

      Review: Amazon’s 2024 Kindle Paperwhite makes the best e-reader a little better

      November 20, 2024
    Technology News & TrendsTechnology News & Trends
    You are at:Home » Android Trojan that intercepts voice calls to banks just got more stealthy
    Featured

    Android Trojan that intercepts voice calls to banks just got more stealthy

    November 20, 2024Updated:November 22, 2024No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Much of the new obfuscation is the result of hiding malicious code in a dynamically decrypted and loaded .dex file of the apps. As a result, Zimperium initially believed the malicious apps they were analyzing were part of a previously unknown malware family. Then the researchers dumped the .dex file from an infected device’s memory and performed static analysis on it.

    “As we delved deeper, a pattern emerged,” Ortega wrote. “The services, receivers, and activities closely resembled those from an older malware variant with the package name com.secure.assistant.” That package allowed the researchers to link it to the FakeCall Trojan.

    Many of the new features don’t appear to be fully implemented yet. Besides the obfuscation, other new capabilities include:

    Bluetooth Receiver

    This receiver functions primarily as a listener, monitoring Bluetooth status and changes. Notably, there is no immediate evidence of malicious behavior in the source code, raising questions about whether it serves as a placeholder for future functionality.

    Screen Receiver

    Similar to the Bluetooth receiver, this component only monitors the screen’s state (on/off) without revealing any malicious activity in the source code.

    Accessibility Service

    The malware incorporates a new service inherited from the Android Accessibility Service, granting it significant control over the user interface and the ability to capture information displayed on the screen. The decompiled code shows methods such as onAccessibilityEvent() and onCreate() implemented in native code, obscuring their specific malicious intent.

    While the provided code snippet focuses on the service’s lifecycle methods implemented in native code, earlier versions of the malware give us clues about possible functionality:

    • Monitoring Dialer Activity: The service appears to monitor events from the com.skt.prod.dialer package (the stock dialer app), potentially allowing it to detect when the user is attempting to make calls using apps other than the malware itself.
    • Automatic Permission Granting: The service seems capable of detecting permission prompts from the com.google.android.permissioncontroller (system permission manager) and com.android.systemui (system UI). Upon detecting specific events (e.g., TYPE_WINDOW_STATE_CHANGED), it can automatically grant permissions for the malware, bypassing user consent.
    • Remote Control: The malware enables remote attackers to take full control of the victim’s device UI, allowing them to simulate user interactions, such as clicks, gestures, and navigation across apps. This capability enables the attacker to manipulate the device with precision.

    Phone Listener Service

    This service acts as a conduit between the malware and its Command and Control (C2) server, allowing the attacker to issue commands and execute actions on the infected device. Like its predecessor, the new variant provides attackers with a comprehensive set of capabilities (see the table below). Some functionalities have been moved to native code, while others are new additions, further enhancing the malware’s ability to compromise devices.

    The Kaspersky post from 2022 said that the only language supported by FakeCall was Korean and that the Trojan appeared to target several specific banks in South Korea. Last year, researchers from security firm ThreatFabric said the Trojan had begun supporting English, Japanese, and Chinese, although there were no indications people speaking those languages were actually targeted.

    Views: 203
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleThousands of hacked TP-Link routers used in yearslong account takeover attacks
    Next Article Here’s the paper no one read before declaring the demise of modern cryptography

    Related Posts

    Biz & IT

    Spies hack Wi-Fi networks in far-off land to launch attack on target next door

    December 2, 2024
    Biz & IT

    QNAP firmware update leaves NAS owners locked out of their boxes

    December 2, 2024
    Biz & IT

    Found on VirusTotal: The world’s first UEFI bootkit for Linux

    December 2, 2024
    Add A Comment

    Comments are closed.

    Technical Analysis for AAPL by TradingView
    Demo
    Top Posts

    Spies hack Wi-Fi networks in far-off land to launch attack on target next door

    December 2, 2024

    QNAP firmware update leaves NAS owners locked out of their boxes

    December 2, 2024

    Found on VirusTotal: The world’s first UEFI bootkit for Linux

    December 2, 2024
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured Reviews

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured Reviews 2 Mins Read
    8.1
    Trends

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Trends 2 Mins Read
    8.9
    Featured Reviews

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Featured Reviews 6 Mins Read

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Spies hack Wi-Fi networks in far-off land to launch attack on target next door

    Tablet PC Market to Witness Exponential Growth by 2028, Sources Say

    Save $25 on Philips Wired Headphone For A Great Sounding Over-Ear Headphone

    Our Picks

    Spies hack Wi-Fi networks in far-off land to launch attack on target next door

    QNAP firmware update leaves NAS owners locked out of their boxes

    Found on VirusTotal: The world’s first UEFI bootkit for Linux

    Subscribe to Updates

    Stay updated with the latest breakthroughs in technology, innovation, and business trends from Faralogic.

    Technology News & Trends
    Facebook X (Twitter) Instagram Pinterest LinkedIn
    • User Agreement
    • Terms and Conditions
    • Disclaimer
    • About Us
    © 2025 FARALOGIC.

    Type above and press Enter to search. Press Esc to cancel.