malware – TheNewsHub https://thenewshub.in Thu, 07 Nov 2024 07:23:35 +0000 en-US hourly 1 https://wordpress.org/?v=6.7 ToxicPanda Banking Trojan Infects Over 1,500 Android Smartphones, Targets 16 Banks: Report https://thenewshub.in/2024/11/07/toxicpanda-banking-trojan-infects-over-1500-android-smartphones-targets-16-banks-report/ https://thenewshub.in/2024/11/07/toxicpanda-banking-trojan-infects-over-1500-android-smartphones-targets-16-banks-report/?noamp=mobile#respond Thu, 07 Nov 2024 07:23:35 +0000 https://thenewshub.in/2024/11/07/toxicpanda-banking-trojan-infects-over-1500-android-smartphones-targets-16-banks-report/

ToxicPanda — a banking trojan that is believed to be in an early stage of development — has been detected by security researchers in Europe and Latin America. It is believed to be derived from another banking trojan detected in 2023, and is used to remotely take over accounts on compromised phones, allowing attackers to transfer funds while bypassing security measures aimed at stopping suspicious transactions. ToxicPanda was reportedly found on over 1,500 devices, while targeting users of 16 banking institutions.

Researchers at Cleafy’s Threat Intelligence detected a new Android malware in October that they previously detected as TgToxic, another banking trojan that was actively used in Southeast Asia and was identified by the group last year. The researchers found that the new sample did not contain capabilities from TgToxic, and that the code was not similar to the original trojan.

The ToxicPanda trojan is disguised as popular applications
Photo Credit: Cleafy

 

As a result, the researchers started to track the newly detected remote access trojan (RAT) as ToxicPanda and warns that the malware can lead to account takeover (ATO) after a victim’s device is infected. Cleafy’s Threat Intelligence team also says that by opting for manual distribution (sideloading, using social engineering), threat actors (TA) can circumvent a bank’s security measures that are used to keep users safe.

In order to access almost all information on a user’s device, the malware exploits the accessibility service on Android, allowing it to capture data from all apps. It is also capable of sidestepping two-factor authentication (such as OTPs) by capturing the contents of the screen. 

The creators of the ToxicPanda malware are Chinese speakers, according to the researchers. Over 1,500 devices were infected with the ToxicPanda trojan and users from Italy were the most impacted — more than 50 percent of all infected devices. Other impacted locations include Portugal, Spain, France, and Peru. Customers of 16 banks were reportedly targeted by the TAs using the ToxicPanda trojan.

The researchers also point out that current antivirus solutions have failed to detect these threats, which suggests the need for a “proactive, real-time detection system”. A botnet of infected devices was also spotted in use in Europe and Latin American countries, which suggests that the Chinese-based TAs are now turning their attention to other markets. 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who’sThat360 on Instagram and YouTube.


Vivo Y19s Price, Availability Announced; Comes With 5,500mAh Battery, 50-Megapixel Camera



Assassin’s Creed Shadows Will Take ‘New Direction’ With Modern-Day Story, Says Ubisoft



]]>
https://thenewshub.in/2024/11/07/toxicpanda-banking-trojan-infects-over-1500-android-smartphones-targets-16-banks-report/feed/ 0
ToxicPanda Banking Trojan Infects Over 1,500 Android Smartphones, Targets 16 Banks: Report https://thenewshub.in/2024/11/07/toxicpanda-banking-trojan-infects-over-1500-android-smartphones-targets-16-banks-report-2/ https://thenewshub.in/2024/11/07/toxicpanda-banking-trojan-infects-over-1500-android-smartphones-targets-16-banks-report-2/?noamp=mobile#respond Thu, 07 Nov 2024 07:23:35 +0000 https://thenewshub.in/2024/11/07/toxicpanda-banking-trojan-infects-over-1500-android-smartphones-targets-16-banks-report-2/

ToxicPanda — a banking trojan that is believed to be in an early stage of development — has been detected by security researchers in Europe and Latin America. It is believed to be derived from another banking trojan detected in 2023, and is used to remotely take over accounts on compromised phones, allowing attackers to transfer funds while bypassing security measures aimed at stopping suspicious transactions. ToxicPanda was reportedly found on over 1,500 devices, while targeting users of 16 banking institutions.

Researchers at Cleafy’s Threat Intelligence detected a new Android malware in October that they previously detected as TgToxic, another banking trojan that was actively used in Southeast Asia and was identified by the group last year. The researchers found that the new sample did not contain capabilities from TgToxic, and that the code was not similar to the original trojan.

The ToxicPanda trojan is disguised as popular applications
Photo Credit: Cleafy

 

As a result, the researchers started to track the newly detected remote access trojan (RAT) as ToxicPanda and warns that the malware can lead to account takeover (ATO) after a victim’s device is infected. Cleafy’s Threat Intelligence team also says that by opting for manual distribution (sideloading, using social engineering), threat actors (TA) can circumvent a bank’s security measures that are used to keep users safe.

In order to access almost all information on a user’s device, the malware exploits the accessibility service on Android, allowing it to capture data from all apps. It is also capable of sidestepping two-factor authentication (such as OTPs) by capturing the contents of the screen. 

The creators of the ToxicPanda malware are Chinese speakers, according to the researchers. Over 1,500 devices were infected with the ToxicPanda trojan and users from Italy were the most impacted — more than 50 percent of all infected devices. Other impacted locations include Portugal, Spain, France, and Peru. Customers of 16 banks were reportedly targeted by the TAs using the ToxicPanda trojan.

The researchers also point out that current antivirus solutions have failed to detect these threats, which suggests the need for a “proactive, real-time detection system”. A botnet of infected devices was also spotted in use in Europe and Latin American countries, which suggests that the Chinese-based TAs are now turning their attention to other markets. 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who’sThat360 on Instagram and YouTube.


Vivo Y19s Price, Availability Announced; Comes With 5,500mAh Battery, 50-Megapixel Camera



Assassin’s Creed Shadows Will Take ‘New Direction’ With Modern-Day Story, Says Ubisoft



]]>
https://thenewshub.in/2024/11/07/toxicpanda-banking-trojan-infects-over-1500-android-smartphones-targets-16-banks-report-2/feed/ 0
Lumma Stealer Malware Being Spread to Windows Devices via Fake Human Verification Pages, CloudSEK Says https://thenewshub.in/2024/09/19/lumma-stealer-malware-being-spread-to-windows-devices-via-fake-human-verification-pages-cloudsek-says/ https://thenewshub.in/2024/09/19/lumma-stealer-malware-being-spread-to-windows-devices-via-fake-human-verification-pages-cloudsek-says/?noamp=mobile#respond Thu, 19 Sep 2024 11:43:34 +0000 https://thenewshub.in/2024/09/19/lumma-stealer-malware-being-spread-to-windows-devices-via-fake-human-verification-pages-cloudsek-says/

Lumma Stealer, a recently identified information-stealing malware, is being distributed to users via fake human verification pages. According to researchers at the cybersecurity firm CloudSEK, the malware is targeting Windows devices and is designed to steal sensitive information from the infected device. Concerningly, researchers have discovered multiple phishing websites which are deploying these fake verification pages to trick users into downloading the malware. CloudSEK researchers have warned organisations to implement endpoint protection solutions and to train employees and users about this new social engineering tactic.

Lumma Stealer Malware Being Distributed Using New Phishing Technique

According to the CloudSEK report, multiple active websites were found to be spreading the Lumma Stealer malware. The technique was first discovered by Unit42 at Palo Alto Networks, a cybersecurity firm, but the scope of the distribution chain is now believed to be much larger than previously assumed.

The attackers have set up various malicious websites and have added a fake human verification system, resembling the Google Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) page. However, unlike the regular CAPTCHA page where users have to check a few boxes or perform similar pattern-based tasks to prove they are not a bot, the fake pages instruct the user to run some unusual commands.

In one instance, the researchers spotted a fake verification page asking users to execute a PowerShell script. PowerShell scripts contain a series of commands that can be executed in the Run dialog box. In this case, the commands were found to fetch the content from the a.txt file hosted on a remote server. This prompted a file to be downloaded and extracted on the Windows system, infecting it with Lumma Stealer.

The report also listed the malicious URLs which were spotted distributing the malware to unsuspecting users. However, this is not the full list and there might be more such websites carrying out the attack.

  • hxxps[://]heroic-genie-2b372e[.]netlify[.]app/please-verify-z[.]html
  • hxxps[://]fipydslaongos[.]b-cdn[.]net/please-verify-z[.]html
  • hxxps[://]sdkjhfdskjnck[.]s3[.]amazonaws[.]com/human-verify-system[.]html
  • hxxps[://]verifyhuman476[.]b-cdn[.]net/human-verify-system[.]html
  • hxxps[://]pub-9c4ec7f3f95c448b85e464d2b533aac1[.]r2[.]dev/human-verify-system[.]html
  • hxxps[://]verifyhuman476[.]b-cdn[.]net/human-verify-system[.]html
  • hxxps[://]newvideozones[.]click/veri[.]html
  • hxxps[://]ch3[.]dlvideosfre[.]click/human-verify-system[.]html
  • hxxps[://]newvideozones[.]click/veri[.]html
  • hxxps[://]ofsetvideofre[.]click

The researchers also observed that content delivery networks (CDNs) were being used to spread these fake verification pages. Further, the attackers were spotted using base64 encoding and clipboard manipulation to evade demonstration. It is also possible to distribute other malware using the same technique, although such instances have not been seen so far.

Since the modus operandi of the attack is based on phishing techniques, no security patch can prevent devices from getting infected. However, there are some steps users and organisations can take to safeguard against the Lumma stealer malware.

As per the report, users and employees should be made aware of this phishing tactic to help them not fall for it. Additionally, organisations should implement and maintain reliable endpoint protection solutions to detect and block PowerShell-based attacks. Further, regularly updating and patching systems to reduce the vulnerabilities that Lumma Stealer malware can exploit should also help.

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who’sThat360 on Instagram and YouTube.


Moto G85 5G Could Soon Be Available in Two New Colour Options in India



]]>
https://thenewshub.in/2024/09/19/lumma-stealer-malware-being-spread-to-windows-devices-via-fake-human-verification-pages-cloudsek-says/feed/ 0