• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

GodFather Android malware targets 400 banks, crypto exchanges

Bill Toulas by Bill Toulas
December 21, 2022
Reading Time: 4 mins read
0
Android malware apps with 2 million installs spotted on Google Play

Evil Android figure

RELATED POSTS

DISH slapped with multiple lawsuits after ransomware cyber attack

Twitter open-sources recommendation algorithm code

15 million public-facing services vulnerable to CISA KEV flaws

An Android banking malware named ‘Godfather’ has been targeting users in 16 countries, attempting to steal account credentials for over 400 online banking sites and cryptocurrency exchanges.

The malware generates login screens overlaid on top of the banking and crypto exchange apps’ login forms when victims attempt to log in to the site, tricking the user into entering their credentials on well-crafted HTML phishing pages.

The Godfather trojan was discovered by Group-IB analysts, who believe it is the successor of Anubis, a once widely-used banking trojan that gradually fell out of use due to its inability to bypass newer Android defenses.

ThreatFabric first discovered Godfather in March 2021, but it has undergone massive code upgrades and improvements since then.

Also,ย Cyble published a report yesterdayย highlighting a rise in the activity of Godfather, pushing an app that mimics a popular music tool in Turkey, downloaded 10 million times via Google Play.

Targeting banks worldwide

Group-IB has found a limited distribution of the malware in apps on the Google Play Store; however, the main distribution channels haven’t been discovered, so the initial infection method is largely unknown.

Buy JNews
ADVERTISEMENT

Almost half of all apps targeted by Godfather, 215, are banking apps, and most of them are in the United States (49), Turkey (31), Spain (30), Canada (22), France (20), Germany (19), and the UK (17).

Apart from banking apps, Godfather targets 110 cryptocurrency exchange platforms and 94 cryptocurrency wallet apps.

Godfather targeting overview
Godfather targeting overview (Group-IB)

Interestingly, the trojan is configured to check the system language, and if it’s set to Russian, Azerbaijani, Armenian, Belarusian, Kazakh, Kyrgyz, Moldovan, Uzbek, or Tajik, it stops its operation.

This is a strong indication that the authors of Godfather are Russian speaking, possibly residing in the CIS (Commonwealth of Independent States) region.

The Godfather

Once installed on the device, Godfather imitates ‘Google Protect,’ a standard security tool found on all Android devices. The malware even goes to the extent of emulating a scanning action on the device.

The goal of this scan is to request access to the Accessibility Service from what appears to be a legitimate tool. Once the victim approves the request, the malware can issue itself all permissions it needs to perform malicious behavior.

This includes access to SMS texts and notifications, screen recording, contacts, making calls, writing to external storage, and reading the device status.

Moreover, the Accessibility Service is abused to prevent the user from removing the trojan, exfiltrating Google Authenticator OTPs (one-time passwords), processing commands, and stealing the contents of PIN and password fields.

Godfather exfiltrates a list of installed apps to receive matching injections (fake HTML login forms to steal credentials) from the C2 server.

โ€œThe web fakes mimic the login pages for the legitimate applications, and all data that is entered into the fake HTML pages, such as usernames and passwords, is exfiltrated to C&C servers.โ€ – Group-IB.

The malware can also generate fake notifications from apps installed on the victim’s device to take the victim to a phishing page, so it doesn’t have to wait for the target app to open.

Examples of fake overlays targeting Turkish users
Examples of fake overlays targeting Turkish users (Group-IB)

For apps not on the list, Godfather can employ its screen recording features to capture the credentials entered by the victim in the fields.

Additionally, the malware also accepts the following commands from the C2, which it executes with administrator privileges on the device:

  • startUSSD โ€“ Execute a USSD request
  • sentSMS โ€“ Send SMS from an infected device (not processed in later malware versions)
  • startApp โ€“ Launch an app defined by the C2
  • cahcecleaner โ€“ Clear app cache for any app determined by the C2
  • BookSMS โ€“ Send SMS to all contacts. Likely used for propagation. Not implemented in the latest version.
  • startforward/stopforward โ€“ Enable/disable call forwarding to a number specified by the C2
  • openbrowser โ€“ Open an arbitrary web page
  • startsocks5/stopsocks5 โ€“ Enable/disable a SOCKS5 proxy
  • killbot โ€“ Self-delete
  • startPush โ€“ Show push notifications that, when clicked, open a web page with a fake page (phishing).

Apart from the above, the trojan feature modules that enable it to perform actions such as keylogging, launching a VNC server, recording the screen, locking the screen, exfiltrating and blocking notifications, enabling silent mode, establishing a WebSocket connection, and dimming the screen.

Connection to Anubis

Anubis’ source code was leaked in 2019, so Godfather might be either a new project from the same authors or a new malware created by a new threat group.

The similarities extend to the method of receiving the C2 address, processing, and implementation of C2 commands, the web fakes module, the proxy module, and the screen capture module.

Godfather has omitted the inclusion of Anubis’ file encryption, audio recording, and GPS tracking modules, but has added a VNC module, implemented a new communication protocol and traffic encryption algorithm, and added a system to steal Google Authenticator codes.

Overall, Godfather is a feature-rich, dangerous trojan built on proven code from the Anubis malware, targeting an extensive list of apps and Android users from around the globe.

To protect yourself against this threat, only download apps from Google Play, keep your device up to date, use an AV tool, ensure that Play Protect is active, and keep the number of installed apps at the minimum possible.

Share54Tweet34Pin12
Bill Toulas

Bill Toulas

Related Posts

Dish Network confirms ransomware attack behind multi-day outage
Cyber Security

DISH slapped with multiple lawsuits after ransomware cyber attack

April 1, 2023
Twitter open-sources recommendation algorithm code
Cyber Security

Twitter open-sources recommendation algorithm code

March 31, 2023
Antivirus and EDR solutions tricked into acting as data wipers
Cyber Security

15 million public-facing services vulnerable to CISA KEV flaws

March 31, 2023
New GoTrim botnet brute forces WordPress site admin accounts
Cyber Security

Hackers exploit bug in Elementor Pro WordPress plugin with 11M installs

March 31, 2023
10-year-old Windows bug with ‘opt-in’ fix exploited in 3CX attack
Cyber Security

10-year-old Windows bug with ‘opt-in’ fix exploited in 3CX attack

March 31, 2023
10-year-old Windows bug with ‘opt-in’ fix exploited in 3CX attack
Cyber Security

10-year-old Windows bug with ‘opt-in’ fix exploited in 3CX attack

March 31, 2023

Recommended Stories

Cloud provider Rackspace hit by ongoing 12-hour Exchange outage

Rackspace: Ongoing Exchange outage caused by security incident

December 3, 2022
LA housing authority discloses data breach after ransomware attack

LA housing authority discloses data breach after ransomware attack

March 13, 2023
Join the Plena Smart Wallet Referral Program and Win Big with $1,000,000 in PLENA Tokens

Join the Plena Smart Wallet Referral Program and Win Big with $1,000,000 in PLENA Tokens

March 10, 2023

Popular Stories

  • New Python malware backdoors VMware ESXi servers for remote access

    Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

    137 shares
    Share 55 Tweet 34
  • Exploit released for actively abused ProxyNotShell Exchange bug

    137 shares
    Share 55 Tweet 34
  • Facts and myths about the warriors who raided Europe and explored the New World

    136 shares
    Share 54 Tweet 34
  • RedEyes hackers use new malware to steal data from Windows, phones

    136 shares
    Share 54 Tweet 34
  • Bing Chat’s secret modes turn it into a personal assistant or friend

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE ยป

Recent Posts

  • The Sandbox [SAND] deserted by users? How NFTs and prices closed Q1
  • DISH slapped with multiple lawsuits after ransomware cyber attack
  • Ripple [XRP] surges in this country, but pump-and-dump fears rise

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?