New Banking Malware DoubleTrouble Attacking Users Via Phishing Sites To Steal Banking Credentials


A sophisticated new banking trojan dubbed DoubleTrouble has emerged as a significant threat to mobile users across Europe, employing advanced evasion techniques and expanding its attack surface through novel distribution channels.

The malware initially spread through phishing websites impersonating well-known European banking institutions, but has recently evolved to leverage bogus websites hosting malicious samples directly within Discord channels.

DoubleTrouble represents a concerning evolution in mobile banking malware, combining traditional overlay attacks with cutting-edge capabilities including comprehensive screen recording, advanced keylogging, and real-time device manipulation.

Google News

The trojan’s sophisticated approach involves disguising itself as legitimate Google Play extensions while secretly deploying its malicious payload from the app’s Resources/raw directory.

Once installed, the malware exploits Android’s Accessibility Services to execute fraudulent activities with unprecedented stealth and effectiveness.

Layouts shown to the user during installation (Source – Zimperium)

Security researchers at Zimperium identified this banking trojan during extensive monitoring operations, collecting 25 samples of earlier variants and 9 samples from the current campaign.

The research team’s analysis revealed the malware’s rapid evolution in both distribution methods and technical capabilities, marking it as one of the most sophisticated banking trojans observed in recent months.

The malware’s impact extends beyond traditional credential theft, incorporating features that enable attackers to gain complete control over infected devices.

DoubleTrouble can capture screen content in real-time, monitor every keystroke, block legitimate banking applications, and present convincing fake interfaces designed to harvest sensitive financial information.

Fake UI’s created by the malware to steal device lockscreen (Source – Zimperium)

These capabilities position the malware as a formidable threat capable of bypassing modern security measures and multi-factor authentication systems.

Advanced Screen Recording and Data Exfiltration Mechanism

DoubleTrouble’s most concerning feature lies in its sophisticated screen recording capability, which leverages Android’s MediaProjection and VirtualDisplay APIs to achieve comprehensive visual surveillance.

The malware initiates this process by requesting screen capture permissions through a carefully concealed activity, minimizing the likelihood of user detection.

Once permission is granted, the trojan creates a virtual display that functions as a real-time mirror of the user’s active screen.

System maintenance overlay shown on top of the application to block (Source – Zimperium)

The technical implementation involves utilizing an ImageReader to capture individual frames from the virtual display, which are subsequently converted to JPEG format and encoded into base64 strings.

This encoded visual data is then encapsulated within JSON objects containing metadata such as screen dimensions and image format specifications.

The complete payload is transmitted to the command and control server, providing attackers with an unobstructed view of all user activities including banking transactions, cryptocurrency operations, and password manager interactions.

DoubleTrouble Complete Command Set:-

CommandDescription
homeWakes the device using a hidden wake lock if the screen is off, or simulates a Home button press via Accessibility if the screen is on
clickClicks on X and Y position on the screen via Accessibility service gesture to simulate touch events
swipe_pathDraw a path across specific screen coordinates using accessibility or touch automation
start_skeletonStarts to capture screenshot-like skeleton view of the current UI, renders it to canvas, and sends it as a Base64 image
stop_skeletonStops sending and sets the flag to false
get_screen_locksRetrieves saved pattern, PIN, and password lock types from shared preferences
pingPings to establish the communication with c2
html_injectionRetrieves the html injection from server and stores in cache folder
clear_injection_cacheClears the saved injection in app_cache_data
get_cached_injectionsCollects cached injection data html files stored in shared preferences
send_pinShows a fake screen to steal pin
send_patternShows a fake screen to steal pattern
send_passwordShows a fake screen to steal password
custom_htmlWrites the ‘html’ string from the JSON or ‘No HTML Found!’ if missing into a temp.html file in the cache
block_appBlocks a particular app received from server and shows maintenance screen
unblock_appUnblocks the app
push_notificationPosts a notification with title, content, and an intent to open either a URL or app
start_graphicalStarts screen capture
stop_graphicalStops screen capture
start_antiEnables a protective flag and scans UI elements for specific text to trigger automated actions
stop_antiDisables a protective flag and stops automated scanning
backSimulates a back button press
recentSimulates a Home button press via the accessibility
lockSimulates pressing the Recents button via accessibility service
muteMutes the audio in the device
open_appOpens a particular package received from server
open_propertiesOpens the App Info screen for a specific package in system settings
open_play_protectOpens Google Play Protect’s ‘Verify Apps’ settings screen, and shows a toast if the activity isn’t available
get_eventsSends a JSON payload containing the saved ‘beats’ data as an ‘events_list’ command if the data exists
enable_black_onDisplay a full black screen overlay
enable_black_offRemoves the black overlay view
enable_update_onDisplays an overlay with fake update with a message ‘Device update started’, ‘Don’t touch’
enable_update_offRemoves the update overlay
enable_html_onCreates an overlay window that covers the entire screen and shows a WebView inside it with the given HTML content
enable_html_offRemoved the overlay view
get_screen_sizeGets the screen width and height and writes to shared preferences

This surveillance mechanism operates silently in the background, capturing sensitive information as users interact with legitimate applications.

The malware’s ability to record exactly what users see enables attackers to bypass traditional security measures, intercept one-time passwords, and gain access to highly confidential financial data through visual observation rather than direct application compromise.

Integrate ANY.RUN TI Lookup with your SIEM or SOAR To Analyses Advanced Threats -> Try 50 Free Trial Searches



Source link