New Android malware targets bank customers in Central Asia

Avatar

A new Android malware is being used to steal information from bank customers in Central Asia, researchers have found.

First spotted in May by Singapore-based cyber firm Group-IB, the Ajina Banker malware is delivered through malicious files disguised as legitimate financial applications, government service portals, or everyday utility tools. These files have been spread via the messaging app Telegram since at least last November, and the campaign is still ongoing.

In a report released on Thursday, researchers said they had found nearly 1,400 unique samples of Ajina Banker malware. The threat actor behind it, who wasn’t identified, works with a network of affiliates targeting ordinary users for financial gain.

Although the malware wasn’t attributed to a specific hacker group, the file names, distribution methods, and other activities of the attackers suggest “a cultural familiarity with the region in which they operate,” Group-IB said.

The countries targeted by Ajina Banker include Kazakhstan, Kyrgyzstan, Tajikistan, and Uzbekistan. Most of the malware samples were specifically designed to target users in Uzbekistan.

The evolution of the malware has caused attacks to expand beyond the originally targeted region, affecting victims in Russia, Ukraine, Pakistan, and even Iceland.

Many users continue to fall victim to Ajina Banker, according to the report. For example, in May attempted infections surpassed 100 per day.

To distribute the malware, the threat actor created numerous Telegram accounts and spread the tool in local chats. Researchers said the distribution process may have been partially automated.

To trick victims into installing malicious files, the hackers crafted convincing messages, such as ones promising rewards, special offers, or exclusive access to sought-after services.

“By tailoring their approach to the interests and needs of the local population, Ajina was able to significantly increase the likelihood of successful infections,” researchers said.

To circumvent security measures on Telegram, which could ban suspicious accounts sending files to group chats, the hackers directed users to external channels controlled by them.

Researchers noted that the adversaries established multiple Telegram accounts designed to blend in with regular users and evade detection for as long as possible. This ability to maintain and operate numerous accounts simultaneously while consistently delivering tailored messages “indicates a high level of planning and coordination.”

Once installed on a victim’s device, Ajina Banker can collect sent and received SMS, information about the SIM card, and a list of installed financial applications.

Since its introduction, Ajina Banker has continually improved, demonstrating heightened sophistication. 

“Social engineering techniques and the scale of the attack were increasingly leveraged to enhance the campaign’s efficiency,” researchers said.

NewsCybercrimeMalware
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

Kawasaki’s European arm restores operation after cyberattack claimed by Ransomhub

Next Post

Largest crypto exchange in Indonesia pledges to reimburse users after $22 million theft

Related Posts

Russian-Linked Hackers Target Eastern European NGOs and Media

Russian and Belarusian non-profit organizations, Russian independent media, and international non-governmental organizations active in Eastern Europe have become the target of two separate spear-phishing campaigns orchestrated by threat actors whose interests align with that of the Russian government. While one of the campaigns – dubbed River of Phish – has been attributed to COLDRIVER, an
Avatar
Read More