Jump to content
  • SpyNote Android malware infections surge after source code leak

    alf9872000

    • 339 views
    • 3 minutes
     Share


    • 339 views
    • 3 minutes

    The Android malware family tracked as SpyNote (or SpyMax) has had a sudden increase in detections in the final quarter of 2022, which is attributed to a source code leak of one of its latest, known as 'CypherRat.'

     

    'CypherRat' combined SpyNote's spying capabilities, such as offering remote access, GPS tracking, and device status and activity updates, with banking trojan features that impersonate banking institutions to steal account credentials.

     

    CypherRat was sold via private Telegram channels from August 2021 until October 2022, when its author decided to publish its source code on GitHub, following a string of scamming incidents on hacking forums that impersonated the project.

     

    Threat actors quickly snatched the malware's source code and launched their own campaigns. Almost immediately, custom variants appeared that targeted reputable banks like HSBC and Deutsche Bank.

     

    banks.png

    Some of the banks targeted by SpyNote (ThreatFabric)

     

    In parallel, other actors opted to masquerade their versions of CypherRat as Google Play, WhatsApp, and Facebook, targeting a wider audience.

     

    app-impersonation.png

    Impersonated applications (ThreatFabric)

     

    This activity was observed by ThreatFabric analysts, who warn about the possibility of CypherRat becoming an even more widespread threat.

    SpyNote malware features

    All SpyNote variants in circulation rely on requesting access to Android's Accessibility Service to be allowed to install new apps, intercept SMS messages (for 2FA bypass), snoop on calls, and record video and audio on the device.

     

    accessibility.png

    Malicious app requesting access to Accessibility Service (ThreatFabric)

     

    ThreatFabric lists the following as "standout" features:

     

    • Use the Camera API to record and send videos from the device to the C2 server
    • GPS and network location tracking information
    • Stealing Facebook and Google account credentials.
    • Use Accessibility (A11y) to extract codes from Google Authenticator.
    • Use keylogging powered by Accessibility services to steal banking credentials.

     

    To hide its malicious code from scrutiny, the latest versions of SpyNote employ string obfuscation and use commercial packers to wrap the APKs.

     

    Moreover, all information exfiltrated from SpyNote to its C2 server is obfuscated using base64 to hide the host.

     

    Threat actors currently use CypherRat as a banking trojan, but the malware could also be used as spyware in low-volume targeted espionage operations.

     

    ThreatFabric believes that SpyNote will continue to constitute a risk for Android users and estimates that various forks of the malware will appear as we head deeper into 2023.

     

    While ThreatFabric has not shared how these malicious apps are being distributed, they are likely spread through phishing sites, third-party Android app sites, and social media.

     

    For this reason, users are advised to be very cautious during the installation of new apps, especially if those come from outside Google Play, and reject requests to grant permissions to access the Accessibility Service.

     

    Unfortunately, despite Google's continual efforts to stop the abuse of Accessibility Service APIs by Android malware, there are still ways to bypass the imposed restrictions.

     

    Source


    User Feedback

    Recommended Comments

    There are no comments to display.



    Join the conversation

    You can post now and register later. If you have an account, sign in now to post with your account.
    Note: Your post will require moderator approval before it will be visible.

    Guest
    Add a comment...

    ×   Pasted as rich text.   Paste as plain text instead

      Only 75 emoji are allowed.

    ×   Your link has been automatically embedded.   Display as a link instead

    ×   Your previous content has been restored.   Clear editor

    ×   You cannot paste images directly. Upload or insert images from URL.


  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...