The famous Anubis Android Malware makes a return targeting around 394 financial organizations in the latest malware campaign that is going around in the wild. Android app impersonating as Orange S.A attempts to steal login credentials across financial organizations, crypto wallets and other payment platforms.
Security researchers from Lookout have identified the malware campaign and are testing the campaign further to understand the full potential of the malware.
Anubis Android Malware was first identified in the Russian hacking forum back in 2016 and then later released as a Banking Trojan. Later, Anubis evolved further and the code was made open-source with the same being shared among the threat actors. In 2019, the Anubis Android Malware included the ransomware module and sneaked into Google Play Store via random apps.
Recently in 2020, Anubis returned again with phishing campaign hitting around 250 banking and e-commerce apps.
Just like any other phishing campaign, the Anubis also manipulates users with fake login pages to steal credentials, but instead of desktop login pages since the malware is targeting mobiles and tablets, this will show a fake overlay login page for the apps and then getaway with the credentials.
However, the recent Anubis Android Malware version targets 394 apps and is capable of more than just stealing the credentials,
Anubis Android Malware validates the device for Google Play Protection and then drops the fake system alert to scare the user for disabling the Google Play Protection.
Currently the distribution is happening via the fake Orange app that is currently taking place via random and malicious websites, social media, smishing and other third party forums.
While we can’t be certain whether the app has been used in a successful attack, we do know they are targeting US banks including Bank of America, U.S. Bank, Capital One, Chase, SunTrust, and Wells Fargo.
There isn’t any evidence or details on the actors behind the Anubis Android Malware as their C2 infrastructure is keeping them in the shadow. We know the actor uses the Cloudfare to redirect his traffic via SSL with C2 masking as a cryptocurrency site.
Users of the Orange app are requested to be cautious about the app they are using and ensure the permissions granted to the app aren’t elevated than necessary.
Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit. You can reach out to us via Twitter or Facebook, for any advertising requests.
Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…
Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…
Discover the top 11 log management tools for efficient system management and monitoring. Learn about…
Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…
Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…
Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…