TsarBot Android Malware Mimics 750 Banking & Finance Apps to Steal Credentials

A newly discovered Android banking malware named TsarBot is targeting over 750 applications globally, including banking, finance, cryptocurrency, and e-commerce platforms.

Identified by Cyble Research and Intelligence Labs (CRIL), TsarBot employs sophisticated overlay attacks and phishing techniques to intercept sensitive credentials and execute fraudulent transactions.

TsarBot spreads through phishing sites that impersonate legitimate financial platforms.

TsarBot Android Malware
Phishing site distributing TsarBot

These sites distribute a dropper disguised as Google Play Services, which installs the malware on targeted devices.

Once installed, TsarBot uses overlay attacks by displaying fake login pages over legitimate applications, tricking users into entering sensitive information such as banking credentials, credit card details, and login passwords.

The malware also captures device lock credentials via a fake lock screen to gain full control over the device. The malware communicates with its command-and-control (C&C) server using WebSocket protocols across multiple ports.

It receives commands to remotely control the infected device’s screen, simulating user actions like swiping, tapping, and entering data. This enables attackers to execute fraudulent transactions while concealing their activities using a black overlay screen.

Technical Capabilities of TsarBot

According to CRIL, TsarBot leverages Accessibility services to enhance its malicious operations. It can record screens, intercept SMS messages, and perform keylogging to collect sensitive information.

The malware identifies installed applications on the infected device and compares them against its target list received from the C&C server. If a match is found, it retrieves injection pages mimicking legitimate apps, prompting users to enter confidential details.

TsarBot Android Malware
Injection page for Indian Bank prompting to enter login and credit card details

Additionally, TsarBot uses lock-grabbing techniques to detect the device’s lock type, such as PINs or patterns, and loads a fake lock screen to capture these credentials.

By combining overlay attacks with screen recording and lock grabbing, TsarBot executes on-device fraud with high precision.

The malware has been observed targeting banking apps across regions like North America, Europe, Asia-Pacific, the Middle East, and Australia.

Besides financial applications, TsarBot also targets social media platforms, e-commerce sites, and cryptocurrency wallets. Its widespread reach underscores the persistent threat posed by banking trojans in the digital landscape.

Recommendations for Protection

To mitigate risks associated with TsarBot and similar threats:

  • Download apps only from official stores like Google Play.
  • Enable Google Play Protect on Android devices.
  • Avoid clicking on suspicious links in emails or SMS messages.
  • Use strong passwords and multi-factor authentication.
  • Regularly update operating systems and applications.

TsarBot represents a significant evolution in Android malware tactics by exploiting accessibility features and overlay attacks to target sensitive financial data.

Its ability to compromise multiple sectors highlights the need for heightened vigilance against phishing campaigns and advanced mobile threats.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free


Source link