New Android malware targets bank customers in Central Asia

Avatar

A new Android malware is being used to steal information from bank customers in Central Asia, researchers have found.

First spotted in May by Singapore-based cyber firm Group-IB, the Ajina Banker malware is delivered through malicious files disguised as legitimate financial applications, government service portals, or everyday utility tools. These files have been spread via the messaging app Telegram since at least last November, and the campaign is still ongoing.

In a report released on Thursday, researchers said they had found nearly 1,400 unique samples of Ajina Banker malware. The threat actor behind it, who wasn’t identified, works with a network of affiliates targeting ordinary users for financial gain.

Although the malware wasn’t attributed to a specific hacker group, the file names, distribution methods, and other activities of the attackers suggest “a cultural familiarity with the region in which they operate,” Group-IB said.

The countries targeted by Ajina Banker include Kazakhstan, Kyrgyzstan, Tajikistan, and Uzbekistan. Most of the malware samples were specifically designed to target users in Uzbekistan.

The evolution of the malware has caused attacks to expand beyond the originally targeted region, affecting victims in Russia, Ukraine, Pakistan, and even Iceland.

Many users continue to fall victim to Ajina Banker, according to the report. For example, in May attempted infections surpassed 100 per day.

To distribute the malware, the threat actor created numerous Telegram accounts and spread the tool in local chats. Researchers said the distribution process may have been partially automated.

To trick victims into installing malicious files, the hackers crafted convincing messages, such as ones promising rewards, special offers, or exclusive access to sought-after services.

“By tailoring their approach to the interests and needs of the local population, Ajina was able to significantly increase the likelihood of successful infections,” researchers said.

To circumvent security measures on Telegram, which could ban suspicious accounts sending files to group chats, the hackers directed users to external channels controlled by them.

Researchers noted that the adversaries established multiple Telegram accounts designed to blend in with regular users and evade detection for as long as possible. This ability to maintain and operate numerous accounts simultaneously while consistently delivering tailored messages “indicates a high level of planning and coordination.”

Once installed on a victim’s device, Ajina Banker can collect sent and received SMS, information about the SIM card, and a list of installed financial applications.

Since its introduction, Ajina Banker has continually improved, demonstrating heightened sophistication. 

“Social engineering techniques and the scale of the attack were increasingly leveraged to enhance the campaign’s efficiency,” researchers said.

NewsCybercrimeMalware
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Kawasaki’s European arm restores operation after cyberattack claimed by Ransomhub

Next Post

Largest crypto exchange in Indonesia pledges to reimburse users after $22 million theft

Related Posts

SEC Charges 4 Companies Over Misleading SolarWinds Cyberattack Disclosures

The U.S. Securities and Exchange Commission (SEC) has charged four current and former public companies for making "materially misleading disclosures" related to the large-scale cyber attack that stemmed from the hack of SolarWinds in 2020. The SEC said the companies – Avaya, Check Point, Mimecast, and Unisys – are being penalized for how they handled the disclosure process in the aftermath of
Avatar
Read More

North Korean Hackers Deploy FudModule Rootkit via Chrome Zero-Day Exploit

A recently patched security flaw in Google Chrome and other Chromium web browsers was exploited as a zero-day by North Korean actors in a campaign designed to deliver the FudModule rootkit. The development is indicative of the persistent efforts made by the nation-state adversary, which had made a habit of incorporating rafts of Windows zero-day exploits into its arsenal in recent months.
Avatar
Read More