top of page
Search

NEW Android malware that targets banking apps and cryptocurrency wallets.

  • Writer: DigitalBank Vault
    DigitalBank Vault
  • Apr 30, 2020
  • 2 min read

Updated: May 10, 2020



Security researchers are sounding the alarm over a newly discovered Android malware that targets banking apps and cryptocurrency wallets. The malware, which researchers at security firm Cybereason recently discovered and called EventBot, masquerades as a legitimate Android app — like Adobe Flash or Microsoft Word for Android — which abuses Android’s in-built accessibility features to obtain deep access to the device’s operating system. Once installed — either by an unsuspecting user or by a malicious person with access to a victim’s phone — the EventBot-infected fake app quietly siphons off passwords for more than 200 banking and cryptocurrency apps — including PayPal, Coinbase, CapitalOne and HSBC — and intercepts and two-factor authentication text message codes. With a victim’s password and two-factor code, the hackers can break into bank accounts, apps, and wallets, and steal a victim’s funds. “The developer behind Eventbot has invested a lot of time and resources into creating the code, and the level of sophistication and capabilities is really high,” Assaf Dahan, head of threat research at Cybereason, told TechCrunch. The malware quietly records every tap and keypress, and can read notifications from other installed apps, giving the hackers a window into what’s happening on a victim’s device. Over time, the malware siphons off banking and cryptocurrency app passwords back to the hackers’ server. The researchers said that EventBot remains a work in progress. Over a period of several weeks since its discovery in March, the researchers saw the malware iteratively update every few days to include new malicious features. At one point the malware’s creators improved the encryption scheme it uses to communicate with the hackers’ server and included a new feature that can grab a user’s device lock code, likely to allow the malware to grant itself higher privileges to the victim’s device like payments and system settings. But while the researchers are stumped as to who is behind the campaign, their research suggests the malware is brand new. “Thus far, we haven’t observed clear cases of copy-paste or code reuse from other malware and it seems to have been written from scratch,” said Dahan. Android malware is not new, but it’s on the rise. Hackers and malware operators have increasingly targeted mobile users because many device owners have their banking apps, social media, and other sensitive services on their devices. Google has improved Android security in recent years by screening apps in its app store and proactively blocking third-party apps to cut down on malware — with mixed results. Many malicious apps have evaded Google’s detection. Cybereason said it has not yet seen EventBot on Android’s app store or in active use in malware campaigns, limiting the exposure to potential victims — for now. But the researchers said users should avoid untrusted apps from third-party sites and stores, many of which don’t screen their apps for malware.





 
 
 

Comments




Anti Interception

Anti Ransomware Extortion
Anti Espionage
Anti Hacking
Anti Spyware 
Anti Location Tracking 
Anti Forensic Data Extraction
Anti Tapping
Anti Remote Digital Surveillance

 

 

 

Coordinate an Online Meeting 

International Calls, SMS

+37257347873

Telegram, Signal, Whatsapp

+37257347873

info@DigitalBankVault.com

IMPORTANT NOTICE:

Our technology is above Governments level , it’s the highest level of anti interception/ anti espionage tech available to the private sector. We sell only and exclusively to reputable companies and individuals that pass our due diligence and KYC procedures.

©2025  by DigitalBank Vault Encryption

bottom of page