TrickMo Android Trojan Exploits Accessibility Services for On-Device Banking Fraud

TrickMo Android Trojan Exploits Accessibility Services for On-Device Banking Fraud

September 13, 2024 at 08:15AM

Cybersecurity researchers have uncovered a new variant of the Android banking trojan TrickMo, designed to evade detection and capture banking credentials. The malware, linked to the TrickBot e-crime gang, features capabilities like screen recording, keystroke logging, and abusing accessibility services for malicious actions. The trojan’s command-and-control server exposed 12 GB of sensitive data, raising concerns of identity theft and financial fraud.

Key takeaways from the meeting notes:

1. A new variant of the Android banking trojan “TrickMo” has been discovered, equipped with new capabilities to evade analysis and display fake login screens to capture victims’ banking credentials.

2. The trojan uses mechanisms like malformed ZIP files and JSONPacker to evade detection and hinder cybersecurity professionals’ efforts to analyze and mitigate the malware.

3. TrickMo has a history of targeting Android devices, particularly users in Germany, to siphon one-time passwords (OTPs) and other two-factor authentication (2FA) codes to facilitate financial fraud.

4. The malware is assessed to be the work of the now-defunct TrickBot e-crime gang and continually improves its obfuscation and anti-analysis features to evade detection.

5. Features of TrickMo include the ability to record screen activity, log keystrokes, harvest photos and SMS messages, conduct on-device fraud, and abuse Android’s accessibility services API to carry out malicious actions.

6. A malicious dropper app masquerading as the Google Chrome web browser is used to install the TrickMo payload, which then requests the user to enable accessibility services, granting extensive control over the device.

7. The malware can dismiss keyguards, auto-accept permissions, disable crucial security features and system updates, and prevent the uninstallation of certain apps.

8. Misconfigurations in the command-and-control (C2) server allowed access to 12 GB of sensitive data exfiltrated from the devices, including credentials and pictures, without authentication.

9. The C2 server also hosts HTML files used in overlay attacks, including fake login pages for various services, highlighting a security lapse and putting victims’ data at risk of exploitation by other threat actors.

10. The wealth of information exposed from TrickMo’s C2 infrastructure could be exploited for identity theft, unauthorized fund transfers, fraudulent purchases, and unauthorized access to accounts.

Furthermore, the meeting notes highlighted Google’s efforts to enhance security by plugging security holes around sideloading using the Play Integrity API.

Please let me know if you need further details or analysis on any specific aspect of the meeting notes.

Full Article