|
|

Accessibility Options

Language
Screen Reader
Bigger Text
Line Height
Text Spacing
Highlight Links
Dyslexia Friendly
ADHD Friendly
Hide Images
Invert Color
Dark Mode
BACK

Escobar Android Malware

Original Issue Date:- March 15, 2022

Virus Type:- Android Banking Trojan

Severity:- High

It has been reported that a new variant of android malware named “Escobar” is targeting android devices for malicious activities. The malware is capable of stealing sensitive information from infected devices including banking credentials, SMS messages, call logs, notifications and Google Authenticator codes. The stolen information is uploaded to command and control (C2) servers operated by attackers.

Escobar malware is based on the Aberebot android banking trojan and includes enhanced capabilities for credential theft, remote device control and data exfiltration.

Infection Mechanism:

'Escobar’ malware is reported to be distributed by cybercriminals using text messages containing links leading to compromised/malicious pages, drive-by-downloads, malicious emails, fake updates, etc.

This new version of ‘Aberebot’ Android banking trojan has been disguised with a name and icon similar to the legitimate anti-virus app McAfee.

Once installed, Escobar displays overlay login forms to hijack user interactions with e-banking apps and websites and steal credentials from victims.

The malware requests multiple permissions, including accessibility, audio recording, read SMS, read/write storage, get account list, disabling the keylock, making calls, and accessing precise device location.

The malware collects information from the device such as SMS, call logs, key logs, notifications and authentication codes and uploads them to the C2 server.

The app can also steal SMS text messages and media files, make phone calls, track location, use the phone's camera, uninstall apps, inject new URLs into web browsers and use remote desktop functionality to completely control the infected mobile device.

Indicator of Compromise:

Domains:

  • secureserverupdates[.]com
  • global-update-service[.]com
  • system-update-checker[.]com

Permissions abused:

  • Accessibility Service
  • Read SMS
  • Record Audio
  • Read / Write Storage
  • Make Phone Calls
  • Access Device Location
  • Disable Keylock

Best Practices and Recommendations:

  • Use genuine mobile security solutions that can protect devices against online threats, malicious applications, and even data loss.
  • Do not download and install applications from untrusted sources [offered via unknown websites/ links on unscrupulous messages]. Install applications downloaded from reputed application market only.
  • Install and maintain updated antivirus solution on android devices. Scan the suspected device with antivirus solutions to detect and clean infections.
  • Prior to downloading / installing apps on android devices (even from Google Play Store), Always review the app details, number of downloads, user reviews, comments and "ADDITIONAL INFORMATION" section.
  • Verify app permissions and grant only those permissions which have relevant context for the app's purpose.
  • In settings, do not enable installation of apps from "Untrusted Sources".
  • Exercise caution while visiting trusted/untrusted sites for clicking links.
  • Install Android updates and patches as and when available from Android device vendors.
  • Don't open attachments in unsolicited e-mails, even if they come from people in your contact list, and never click on a URL contained in an unsolicited e-mail, even if the link seems benign. Be careful of opening unsolicited and unexpected emails, especially those that call for urgency. In cases of genuine URLs, close out the e-mail and go to the organization’s website directly through browser.
  • Block the attachments of file types, exe|pif|tmp|url|vb|vbe|scr|reg|cer|pst|cmd|com|bat|dll|dat|hlp|hta|js|wsf
  • Users are advised to use device encryption or encrypting external SD card feature available with most of the android OS.
  • Do not download or open attachment in emails received from untrusted sources or unexpectedly received from trusted users
  • Avoid using unsecured, unknown Wi-Fi networks. There may be rogue Wi-Fi access points at public places used for distributing malicious applications.
  • Confirm that the banking/financial app you’re using is the official, verified version.
  • If anything looks awry or suddenly unfamiliar, check in with your bank’s/financial service provider's customer service team.
  • Use two-factor authentication if it’s available.
  • Make sure you have a strong AI-powered mobile antivirus installed to detect and block this kind of tricky malware if it ever makes its way onto your system.
  • Refer to security best practices for mobile Phone users: http://www.csk.gov.in/documents/Mobile_phone_Security.pdf