{"id":20895,"date":"2022-12-22T16:10:58","date_gmt":"2022-12-23T00:10:58","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/12\/22\/news-14628\/"},"modified":"2022-12-22T16:10:58","modified_gmt":"2022-12-23T00:10:58","slug":"news-14628","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/12\/22\/news-14628\/","title":{"rendered":"Godfather Android banking malware is on the rise"},"content":{"rendered":"<p><a href=\"https:\/\/blog.cyble.com\/2022\/12\/20\/godfather-malware-returns-targeting-banking-users\/\" target=\"_blank\">Researchers at Cyble Research &amp; Intelligence Labs (CRIL)<\/a> have found a new version of the Android banking Trojan called Godfather.<\/p>\n<p>The new version of Godfather uses an icon and name similar to a legitimate application named MYT Music, which is hosted on the Google Play Store with over 10 million downloads.<\/p>\n<h2>History<\/h2>\n<p><a href=\"https:\/\/blog.group-ib.com\/godfather-trojan\" target=\"_blank\">Group-IB researchers<\/a>&nbsp;established that Godfather&nbsp;is a successor of Anubis. Anubis was a widely used Android banking Trojan that lost popularity after its functionality got limited by Android updates and security vendors&rsquo; detection and prevention efforts.<\/p>\n<p>Godfather&#8217;s success is mostly due to its ability to create convincing lay-over screens for over 400 applications. This use of lay-over screens or web fakes, are basically HTML pages created by threat actors that display over legitimate applications. This allows the threat actors to harvest login credentials for banking applications and other financial services. The target apps include banking applications, cryptocurrency wallets, and crypto exchanges.<\/p>\n<p>The most popular target apps for the banking Trojan are in the United States (49 companies), Turkey (31), Spain (30), Canada (22), France (20), Germany (19), and the United Kingdom (17). The Trojan checks the system language of the infected device and shuts down if it is one of these: Russian, Azerbaijani, Armenian, Belarusian, Kazakh, Kyrgyz, Moldovan, Uzbek, or Tajik.<\/p>\n<h2>Install<\/h2>\n<p>Several of the new Godfather samples were found masquerading as the MYT M&uuml;zik application which is written in the Turkish language. After installing it uses an icon and the name that are very similar to a legitimate application named MYT Music. MYT Music is a popular app with over 10 million installs.<\/p>\n<h2>Getting permissions<\/h2>\n<p>To get the necessary permissions, the Trojan poses as Google Protect, which is a standard security tool found on all Android devices. It pretends to initiate a scan and asks the user for access to the Accessibility Service. Which makes sense to the user given that they think the app will scan the device. With access to the Accessibility Service, the Trojan can grant itself all the permissions it needs to steal information from the affected device.<\/p>\n<h2>Capabilities<\/h2>\n<p>Once fully active, Godfather steals sensitive data such as SMS messages, basic device details including installed apps data, and the device&rsquo;s phone number. It can also control the device screen, forward incoming calls of the victim&rsquo;s device, and inject banking URLs. The Trojan is capable of initiating money transfers by making USSD (Unstructured Supplementary Service Data) calls without using the dialer user interface<\/p>\n<p>It sends the harvested data to the attacker. Who, in turn, now know which apps are installed and can inject HTML phishing pages that are most effective if the victim has the imitated app installed. The <a href=\"https:\/\/www.malwarebytes.com\/glossary\/cc\">Command &amp; Control (C2)<\/a> server&rsquo;s URL is fetched from a Telegram channel.<\/p>\n<h2>IOCs<\/h2>\n<p>For the variant posing as the MYT Muzik app CRIL provided:<\/p>\n<p>APK Metadata Information<\/p>\n<ul>\n<li>App Name: MYT M&uuml;zik<\/li>\n<li>Package Name: com.expressvpn.vpn<\/li>\n<li>SHA256 Hash: 138551cd967622832f8a816ea1697a5d08ee66c379d32d8a6bd7fca9fdeaecc4<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.malwarebytes.com\/android\">Malwarebytes for Android<\/a> detects these new variants of the Godfather Trojan as <a href=\"https:\/\/www.malwarebytes.com\/blog\/detections\/android-trojan-spy-banker-myt\">Android\/Trojan.Spy.Banker.MYT<\/a>.<\/p>\n<h2>How to avoid malware<\/h2>\n<p>There are a few basic guidelines that can help you prevent installing malware on your device.<\/p>\n<ul>\n<li>Download and install software only from official app stores like Google Play Store or the iOS App Store. And check whether the app you are downloading is exactly the one you wanted and not some imitator.<\/li>\n<li>Use a reputed anti-virus\/anti-malware and internet security software package on your connected devices, such as PCs, laptops, and mobile devices.<\/li>\n<li>Use strong <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/10\/why-almost-everything-we-told-you-about-passwords-was-wrong\">passwords<\/a> and enforce <a href=\"https:\/\/www.malwarebytes.com\/glossary\/multi-factor-authentication-mfa\">multi-factor authentication (MFA)<\/a> wherever possible.<\/li>\n<li>Enable biometric security features such as fingerprint or facial recognition for unlocking the mobile device if possible.<\/li>\n<li>Be very careful before opening any links received via SMS or emails delivered to your phone.<\/li>\n<li>Ensure that Google Play Protect is enabled on Android devices.<\/li>\n<li>Be careful while enabling any permissions. Reading carefully what you are allowing an app to do helps you flag unusual and suspicious requests.<\/li>\n<\/ul>\n<hr \/>\n<p><strong>We don&rsquo;t just report on threats&mdash;we remove them<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by <a href=\"https:\/\/www.malwarebytes.com\/for-home\">downloading Malwarebytes today<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/12\/godfather-android-banking-malware-is-on-the-rise\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/android\" rel=\"category tag\">Android<\/a><\/p>\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/news\" rel=\"category tag\">News<\/a><\/p>\n<p>Tags: Android<\/p>\n<p>Tags:  banking Trojan<\/p>\n<p>Tags:  Godfather<\/p>\n<p>Tags:  Anubis<\/p>\n<p>Tags:  lay-over screen<\/p>\n<p>Tags:  C&#038;C<\/p>\n<p>Tags:  MYT<\/p>\n<p>Tags:  Google Protect<\/p>\n<p>Researchers have uncovered a new campaign of the Godfather banking Trojan, that comes with some new tricks.<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/12\/godfather-android-banking-malware-is-on-the-rise\" title=\"Godfather Android banking malware is on the rise\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/12\/godfather-android-banking-malware-is-on-the-rise\">Godfather Android banking malware is on the rise<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10462,19207,11990,16928,28232,28235,28233,28234,32],"class_list":["post-20895","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-android","tag-anubis","tag-banking-trojan","tag-cc","tag-godfather","tag-google-protect","tag-lay-over-screen","tag-myt","tag-news"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20895","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=20895"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20895\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=20895"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=20895"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=20895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}