{"id":23436,"date":"2023-11-22T07:01:03","date_gmt":"2023-11-22T15:01:03","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/11\/22\/news-17166\/"},"modified":"2023-11-22T07:01:03","modified_gmt":"2023-11-22T15:01:03","slug":"news-17166","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/11\/22\/news-17166\/","title":{"rendered":"Social engineering attacks lure Indian users to install Android banking trojans"},"content":{"rendered":"<p><strong>Credit to Author: Microsoft Threat Intelligence| Date: Tue, 21 Nov 2023 04:30:00 +0000<\/strong><\/p>\n<p>Microsoft has observed ongoing activity from mobile banking trojan campaigns targeting users in India with social media messages designed to steal users\u2019 information for financial fraud. Using social media platforms like WhatsApp and Telegram, attackers are sending messages designed to lure users into installing a malicious app on their mobile device by impersonating legitimate organizations, such as banks, government services, and utilities. Once installed, these fraudulent apps exfiltrate various types of sensitive information from users, which can include personal information, banking details, payment card information, account credentials, and more.<\/p>\n<p>While not a new threat, mobile malware infections pose a significant threat to mobile users, such as unauthorized access to personal information, financial loss due to fraudulent transactions, loss of privacy, device performance issues due to malware consuming system resources, and data theft or corruption. In the past, we observed similar banking trojan campaigns sending malicious links leading users to download malicious apps, as detailed in our blog <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/09\/21\/rewards-plus-fake-mobile-banking-rewards-apps-lure-users-to-install-info-stealing-rat-on-android-devices\/\">Rewards plus: Fake mobile banking rewards apps lure users to install info-stealing RAT on Android devices<\/a>.<\/p>\n<p>The current active campaigns have pivoted to sharing malicious APK files directly to mobile users located in India. Our investigation focused on two malicious applications that falsely present themselves as official banking apps. Spoofing and impersonating legitimate banks, financial institutions, and other official services is a common social engineering tactic for information-stealing malware. Importantly, legitimate banks themselves are not affected by these attacks directly, and the existence of these attacks is not related to legitimate banks\u2019 own authentic mobile banking apps and security posture. That said, cybercriminals often target customers of large financial institutions by masquerading as a legitimate entity. This threat highlights the need for customers to install applications only from official app stores, and to be wary of false lures as we see in these instances.<\/p>\n<p>In this blog, we shed light on the ongoing mobile banking trojan campaigns impacting various sectors by analyzing the attacks of two fraudulent apps targeting Indian banking customers. We also detail some of the additional capabilities of malicious apps observed in similar campaigns and provide recommendations and detections to defend against such threats. As our mobile threat research continuously monitors malware campaigns in the effort to combat attackers\u2019 tactics, tools, and procedures (TTPs), we notified the organizations being impersonated by these fake app campaigns. Microsoft is also reporting on this activity to bring increased awareness to the threat landscape as mobile banking trojans and credential phishing fraud continues to persist, prompting an urgent call for robust and proactive defense strategies.<\/p>\n<h2 class=\"wp-block-heading\">Case 1: Fake banking app targeting account information<\/h2>\n<p>We discovered a recent WhatsApp phishing campaign through our telemetry that led to banking trojan activity. In this campaign, the attacker shares a malicious APK file through WhatsApp with a message asking users to enter sensitive information in the app. The widely circulated fake banking message states \u201cYour <strong>[redacted]<\/strong> BANK Account will be Blocked Today please update your PANCARD immediately open <strong>[redacted]<\/strong>-Bank.apk for update your PANCARD. Thank You.\u201d and includes a APK file named <strong>[redacted]<\/strong><em>-BANK[.]apk.&nbsp;<\/em><\/p>\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"840\" height=\"1562\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-1.-A-fake-WhatsApp-message-sent-to-user-to-update-KYC-using-shared-APK-file-1.jpg\" alt=\"Screenshot of a fake WhatsApp phishing message asking users to update KYC using a APK file.\" class=\"wp-image-132445\" style=\"aspect-ratio:0.5366666666666666;width:352px;height:auto\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-1.-A-fake-WhatsApp-message-sent-to-user-to-update-KYC-using-shared-APK-file-1.jpg 840w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-1.-A-fake-WhatsApp-message-sent-to-user-to-update-KYC-using-shared-APK-file-1-161x300.jpg 161w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-1.-A-fake-WhatsApp-message-sent-to-user-to-update-KYC-using-shared-APK-file-1-551x1024.jpg 551w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-1.-A-fake-WhatsApp-message-sent-to-user-to-update-KYC-using-shared-APK-file-1-768x1428.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-1.-A-fake-WhatsApp-message-sent-to-user-to-update-KYC-using-shared-APK-file-1-826x1536.jpg 826w\" sizes=\"auto, (max-width: 840px) 100vw, 840px\" \/><figcaption class=\"wp-element-caption\"><em>Figure 1. A fake WhatsApp message sent to user to update KYC using shared APK file.<\/em><\/figcaption><\/figure>\n<p>Upon investigation, we discovered that the APK file was malicious and interacting with it installs a fraudulent application on the victim device. The installed app impersonates a legitimate bank located in India and disguises itself as the bank\u2019s official Know Your Customer (KYC) application to trick users into submitting their sensitive information, despite this particular banking organization not being affiliated with an official KYC-related app. This information is then sent to a command and control (C2) server, as well as to the attacker&#8217;s hard-coded phone number used in SMS functionality.<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-2.-The-attack-flow-1024x309.webp\" alt=\"Diagram of the attack flow depicting how an attacker sends an SMS or social media message and a malicious APK file to users that users download and install onto devices. The APK file then installs a fraudulent app impersonating a legitimate banking organization and requests the user's KYC information, bank account details, and credentials, which are submitted and sent to the attacker's C2 server and hard-coded phone number.\" class=\"wp-image-132446 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-2.-The-attack-flow-1024x309.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-2.-The-attack-flow-300x91.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-2.-The-attack-flow-768x232.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-2.-The-attack-flow-1536x464.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-2.-The-attack-flow-2048x618.webp 2048w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-2.-The-attack-flow-1024x309.webp\"><figcaption class=\"wp-element-caption\"><em>Figure 2. The attack flow of this campaign.<\/em><\/figcaption><\/figure>\n<h3 class=\"wp-block-heading\">What users see<\/h3>\n<p>Upon installation, the fake app displays a bank icon posing as a legitimate bank app. Note that the app we analyzed is not an official bank app from the Google Play Store, but a fake app that we\u2019ve observed being distributed through social media platforms. &nbsp;<\/p>\n<p>The initial screen then proceeds to ask the user to enable SMS-based permissions. Once the user allows the requested permissions, the fake app displays the message \u201cWelcome to <strong>[redacted]<\/strong><strong> <\/strong>Bank fast &amp; Secure Online KYC App\u201d and requests users to signin to internet banking by entering their mobile number, ATM pin, and PAN card details.<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-3.-Once-installed-on-a-device-the-fake-app-asks-users-to-allow-SMS-permissions-and-to-sign-in-to-internet-banking-1-1024x483.webp\" alt=\"Four mobile screenshots from left to right: the fake WhatsApp message, an icon in the app tray displaying a legitimate bank icon, the fake app requesting SMS permissions, and the fake app requesting users' to submit their banking, mobile number, ATM pin, and PAN card information. \" class=\"wp-image-132448 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-3.-Once-installed-on-a-device-the-fake-app-asks-users-to-allow-SMS-permissions-and-to-sign-in-to-internet-banking-1-1024x483.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-3.-Once-installed-on-a-device-the-fake-app-asks-users-to-allow-SMS-permissions-and-to-sign-in-to-internet-banking-1-300x142.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-3.-Once-installed-on-a-device-the-fake-app-asks-users-to-allow-SMS-permissions-and-to-sign-in-to-internet-banking-1-768x362.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-3.-Once-installed-on-a-device-the-fake-app-asks-users-to-allow-SMS-permissions-and-to-sign-in-to-internet-banking-1-1536x725.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-3.-Once-installed-on-a-device-the-fake-app-asks-users-to-allow-SMS-permissions-and-to-sign-in-to-internet-banking-1.webp 1806w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-3.-Once-installed-on-a-device-the-fake-app-asks-users-to-allow-SMS-permissions-and-to-sign-in-to-internet-banking-1-1024x483.webp\"><figcaption class=\"wp-element-caption\"><em>Figure 3. Once installed on a device, the fake app asks users to allow SMS permissions and to sign-in to internet banking and submit their mobile number, ATM pin, and PAN card to update KYC.&nbsp;<\/em><\/figcaption><\/figure>\n<p>After clicking the sign-in button, the app displays a verification prompt asking the user to enter the digits on the back of their banking debit card in grid format for authentication\u2014a common security feature used as a form of multifactor authentication (MFA), where banks provide debit cards with 2-digit numbers in the form of a grid on the back of the card. Once the user clicks the authenticate button, the app claims to verify the shared details but fails to retrieve data, instead moving on to the next screen requesting additional user information. This can trick the user into believing that the process is legitimate, while remaining unaware of the malicious activity launching in the background.<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-4.-The-fake-apps-authentication-process-asks-the-user-to-enter-the-correct-digits-as-presented-on-their-debit-card-2-1024x517.webp\" alt=\"Four mobile screenshots from left to right: the fake app appearing to authenticate users' bank information, the fake app requesting users' digits on the back of their debit card, user authenticating those digits, the fake app appearing to verify the information again. \" class=\"wp-image-132453 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-4.-The-fake-apps-authentication-process-asks-the-user-to-enter-the-correct-digits-as-presented-on-their-debit-card-2-1024x517.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-4.-The-fake-apps-authentication-process-asks-the-user-to-enter-the-correct-digits-as-presented-on-their-debit-card-2-300x152.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-4.-The-fake-apps-authentication-process-asks-the-user-to-enter-the-correct-digits-as-presented-on-their-debit-card-2-768x388.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-4.-The-fake-apps-authentication-process-asks-the-user-to-enter-the-correct-digits-as-presented-on-their-debit-card-2-1536x776.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-4.-The-fake-apps-authentication-process-asks-the-user-to-enter-the-correct-digits-as-presented-on-their-debit-card-2-2048x1034.webp 2048w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-4.-The-fake-apps-authentication-process-asks-the-user-to-enter-the-correct-digits-as-presented-on-their-debit-card-2-1024x517.webp\"><figcaption class=\"wp-element-caption\"><em>Figure 4. The fake app&rsquo;s authentication process asks the user to enter the correct digits as presented on their debit card.<\/em><\/figcaption><\/figure>\n<p>Next, the user is asked to enter their account number followed by their account credentials. Once all the requested details are submitted, a suspicious note appears stating that the details are being verified to update KYC. The user is instructed to wait 30 minutes and not to delete or uninstall the app. Additionally, the app has the functionality to hide its icon, causing it to disappear from the user&#8217;s device home screen while still running in the background.<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-5.-The-fraudulent-app-steals-the-users-account-number-and-credentials-and-hides-its-icon-from-the-home-screen-1-1024x479.webp\" alt=\"Four mobile screenshots from left to right: the fake app requesting users' account numbers followed by their credentials, the fake app displays a phony note that the entered information is being verified, the fake app's icon disappears from the user's app tray. \" class=\"wp-image-132452 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-5.-The-fraudulent-app-steals-the-users-account-number-and-credentials-and-hides-its-icon-from-the-home-screen-1-1024x479.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-5.-The-fraudulent-app-steals-the-users-account-number-and-credentials-and-hides-its-icon-from-the-home-screen-1-300x140.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-5.-The-fraudulent-app-steals-the-users-account-number-and-credentials-and-hides-its-icon-from-the-home-screen-1-768x360.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-5.-The-fraudulent-app-steals-the-users-account-number-and-credentials-and-hides-its-icon-from-the-home-screen-1-1536x719.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-5.-The-fraudulent-app-steals-the-users-account-number-and-credentials-and-hides-its-icon-from-the-home-screen-1-2048x959.webp 2048w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-5.-The-fraudulent-app-steals-the-users-account-number-and-credentials-and-hides-its-icon-from-the-home-screen-1-1024x479.webp\"><figcaption class=\"wp-element-caption\"><em>Figure 5. The fraudulent app steals the user&rsquo;s account number and credentials and hides its icon from the home screen.<\/em><\/figcaption><\/figure>\n<h3 class=\"wp-block-heading\">Technical analysis<\/h3>\n<p>To start our investigation and as part of our proactive research, we located and analyzed the following sample:<\/p>\n<figure class=\"wp-block-table table\">\n<table>\n<tbody>\n<tr>\n<td><strong>SHA-256<\/strong><\/td>\n<td><em>6812a82edcb49131a990acd88ed5f6d73da9f536b60ee751184f27265ea769ee<\/em>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td><strong>Package name<\/strong><\/td>\n<td><em>djhgsfjhfdgf[.]gjhdgsfsjde[.]myappl876786ication<\/em><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>We first examined the app\u2019s <em>AndroidManifest<\/em> file, which lists the permissions and components (such as activities, services, receivers, and providers) that can run in the background without requiring user interaction. We discovered that the malware requests two runtime permissions (also known as <a href=\"https:\/\/developer.android.com\/guide\/topics\/permissions\/overview#dangerous_permissions\" target=\"_blank\" rel=\"noreferrer noopener\">dangerous permissions)<\/a> from users:&nbsp;<\/p>\n<figure class=\"wp-block-table table\">\n<table>\n<tbody>\n<tr>\n<td><strong>Permissions&nbsp;<\/strong><\/td>\n<td><strong>Description&nbsp;<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong><em>Receive_SMS<\/em><\/strong><strong>&nbsp;<\/strong><\/td>\n<td>Intercept SMSs received on the victim\u2019s device&nbsp;<\/td>\n<\/tr>\n<tr>\n<td><strong><em>Send_SMS<\/em><\/strong><strong>&nbsp;<\/strong><\/td>\n<td>Allows an application to send SMS&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>The below image displays the requested <em>Receive_SMS<\/em> and <em>Send_SMS<\/em> permissions, the activities, receivers, and providers used in the application, and the launcher activity, which loads the application\u2019s first screen.&nbsp;<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-6.-AndroidManifest.xml-file-2-1024x384.webp\" alt=\"Screenshot of code displaying the AndroidManifest.xml file, noting the package name, permissions used, main activity class, and components used.\" class=\"wp-image-132482 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-6.-AndroidManifest.xml-file-2-1024x384.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-6.-AndroidManifest.xml-file-2-300x113.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-6.-AndroidManifest.xml-file-2-768x288.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-6.-AndroidManifest.xml-file-2-1536x577.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-6.-AndroidManifest.xml-file-2-2048x769.webp 2048w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-6.-AndroidManifest.xml-file-2-1024x384.webp\"><figcaption class=\"wp-element-caption\"><em>Figure 6. AndroidManifest.xml file<\/em><\/figcaption><\/figure>\n<h3 class=\"wp-block-heading\">Source code review<\/h3>\n<h4 class=\"wp-block-heading\">Main activity<\/h4>\n<p>The main activity, <em>djhgsfjhfdgf[.]gjhdgsfsjde[.]myappl876786ication[.]M1a2i3n4A5c6t7i8v9i0t0y987654321<\/em>, executes once the app is launched and shows as the first screen of the application. The <em>OnCreate()<\/em> method of this class requests permissions for <em>Send_SMS<\/em> and <em>Receive_SMS<\/em> and displays a form to complete the KYC application with text fields for a user\u2019s mobile number, ATM pin, and PAN card. Once the user\u2019s details are entered successfully, the collected data is added to a JSON object and sent to the attacker\u2019s C2 at: <em>https:\/\/biogenetic-flake.000webhostapp[.]com\/add.php<\/em><\/p>\n<p>The app displays a note saying \u201cData added successfully\u201d. If the details are not entered successfully, the form fields will be empty, and an error note will be displayed.<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-7.-Launcher-activity-page-asking-the-user-to-sign-in-with-their-mobile-number-ATM-pin-and-PAN-card-1-1024x587.webp\" alt=\"Screenshot of code displaying the launcher activity page, noting the requested permissions, requested information in the launcher activity, the data text fields for mobile number, ATM pin, and PAN card, the filled data sent to the attacker's C2 and the submitted details added to the attacker's C2. \" class=\"wp-image-132481 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-7.-Launcher-activity-page-asking-the-user-to-sign-in-with-their-mobile-number-ATM-pin-and-PAN-card-1-1024x587.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-7.-Launcher-activity-page-asking-the-user-to-sign-in-with-their-mobile-number-ATM-pin-and-PAN-card-1-300x172.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-7.-Launcher-activity-page-asking-the-user-to-sign-in-with-their-mobile-number-ATM-pin-and-PAN-card-1-768x440.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-7.-Launcher-activity-page-asking-the-user-to-sign-in-with-their-mobile-number-ATM-pin-and-PAN-card-1-1536x880.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-7.-Launcher-activity-page-asking-the-user-to-sign-in-with-their-mobile-number-ATM-pin-and-PAN-card-1-2048x1173.webp 2048w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-7.-Launcher-activity-page-asking-the-user-to-sign-in-with-their-mobile-number-ATM-pin-and-PAN-card-1-1024x587.webp\"><figcaption class=\"wp-element-caption\"><em>Figure 7. Launcher activity page, asking the user to sign-in with their mobile number, ATM pin, and PAN card.&nbsp;&nbsp;<\/em><\/figcaption><\/figure>\n<p>Additionally, the malware collects data and sends it to the attacker&#8217;s phone number specified in the code using SMS.&nbsp;<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-8.-Collected-data-sent-to-the-attackers-mobile-number-as-a-SMS-1-1024x136.webp\" alt=\"Screenshot of code displaying how collected information is also sent to the attacker's mobile number. \" class=\"wp-image-132480 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-8.-Collected-data-sent-to-the-attackers-mobile-number-as-a-SMS-1-1024x136.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-8.-Collected-data-sent-to-the-attackers-mobile-number-as-a-SMS-1-300x40.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-8.-Collected-data-sent-to-the-attackers-mobile-number-as-a-SMS-1-768x102.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-8.-Collected-data-sent-to-the-attackers-mobile-number-as-a-SMS-1-1536x203.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-8.-Collected-data-sent-to-the-attackers-mobile-number-as-a-SMS-1-2048x271.webp 2048w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-8.-Collected-data-sent-to-the-attackers-mobile-number-as-a-SMS-1-1024x136.webp\"><figcaption class=\"wp-element-caption\"><em>Figure 8. Collected data sent to the attacker&rsquo;s mobile number as a SMS.&nbsp;<\/em><\/figcaption><\/figure>\n<h4 class=\"wp-block-heading\">Stealing SMS messages and account information<\/h4>\n<p>The malware collects incoming SMS messages from the victim\u2019s device using the newly granted <em>Receive_SMS<\/em> permission. These incoming messages may contain one-time passwords (OTPs) that can be used to bypass MFA and steal money from the victim&#8217;s bank account.&nbsp;Using the <em>Send_SMS<\/em> permission, the victim\u2019s messages are then sent to the attacker\u2019s C2 server (<em>https[:]\/\/biogenetic-flake[.]000webhostapp[.]com\/save_sms[.]php?phone=<\/em>) and to the attacker\u2019s hardcoded phone number via SMS.<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-9.-Steals-incoming-SMS-to-send-to-the-attackers-C2-and-mobile-number-via-SMS-1-1024x513.webp\" alt=\"Screenshot of code stealing incoming SMS to send to the attacker's C2 and mobile number. \" class=\"wp-image-132479 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-9.-Steals-incoming-SMS-to-send-to-the-attackers-C2-and-mobile-number-via-SMS-1-1024x513.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-9.-Steals-incoming-SMS-to-send-to-the-attackers-C2-and-mobile-number-via-SMS-1-300x150.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-9.-Steals-incoming-SMS-to-send-to-the-attackers-C2-and-mobile-number-via-SMS-1-768x385.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-9.-Steals-incoming-SMS-to-send-to-the-attackers-C2-and-mobile-number-via-SMS-1-1536x770.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-9.-Steals-incoming-SMS-to-send-to-the-attackers-C2-and-mobile-number-via-SMS-1-2048x1026.webp 2048w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-9.-Steals-incoming-SMS-to-send-to-the-attackers-C2-and-mobile-number-via-SMS-1-1024x513.webp\"><figcaption class=\"wp-element-caption\"><em>Figure 9. Steals incoming SMS to send to the attacker&rsquo;s C2 and mobile number via SMS.<\/em><\/figcaption><\/figure>\n<p>The user\u2019s bank account information is also targeted for exfiltration\u2014once the user submits their requested account number and account credentials, the malware collects the data and similarly sends it to the attacker\u2019s C2 server and hard-coded phone number.&nbsp;<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-10.-Collecting-the-users-account-number-to-send-to-the-attacker-6-1024x395.webp\" alt=\"Screenshot of code collecting the user's account number to be sent to the attacker's C2 and mobile number.\" class=\"wp-image-132478 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-10.-Collecting-the-users-account-number-to-send-to-the-attacker-6-1024x395.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-10.-Collecting-the-users-account-number-to-send-to-the-attacker-6-300x116.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-10.-Collecting-the-users-account-number-to-send-to-the-attacker-6-768x296.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-10.-Collecting-the-users-account-number-to-send-to-the-attacker-6-1536x593.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-10.-Collecting-the-users-account-number-to-send-to-the-attacker-6-2048x790.webp 2048w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-10.-Collecting-the-users-account-number-to-send-to-the-attacker-6-1024x395.webp\"><figcaption class=\"wp-element-caption\"><em>Figure 10. Collecting the user&rsquo;s account number to send to the attacker.<\/em><\/figcaption><\/figure>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-11.-Collecting-the-users-account-credentials-to-send-to-the-attacker-3-1024x439.webp\" alt=\"Screenshot of code collecting the user's account credentials to be sent to the attacker's C2 and mobile number.\" class=\"wp-image-132471 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-11.-Collecting-the-users-account-credentials-to-send-to-the-attacker-3-1024x439.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-11.-Collecting-the-users-account-credentials-to-send-to-the-attacker-3-300x129.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-11.-Collecting-the-users-account-credentials-to-send-to-the-attacker-3-768x329.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-11.-Collecting-the-users-account-credentials-to-send-to-the-attacker-3-1536x658.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-11.-Collecting-the-users-account-credentials-to-send-to-the-attacker-3-2048x878.webp 2048w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-11.-Collecting-the-users-account-credentials-to-send-to-the-attacker-3-1024x439.webp\"><figcaption class=\"wp-element-caption\"><em>Figure 11. Collecting the user&rsquo;s account credentials to send to the attacker.&nbsp;<\/em><\/figcaption><\/figure>\n<h4 class=\"wp-block-heading\">Hiding app icon<\/h4>\n<p>Finally, the app has the functionality to hide its icon from the home screen and run in the background.&nbsp;<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-12.-Hides-app-icon-from-home-screen-1-1024x76.webp\" alt=\"Screenshot of code hiding the app's icon from the home screen and app tray. \" class=\"wp-image-132466 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-12.-Hides-app-icon-from-home-screen-1-1024x76.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-12.-Hides-app-icon-from-home-screen-1-300x22.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-12.-Hides-app-icon-from-home-screen-1-768x57.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-12.-Hides-app-icon-from-home-screen-1-1536x115.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-12.-Hides-app-icon-from-home-screen-1-2048x153.webp 2048w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-12.-Hides-app-icon-from-home-screen-1-1024x76.webp\"><figcaption class=\"wp-element-caption\"><em>Figure 12. Hides app icon from home screen&nbsp;<\/em><\/figcaption><\/figure>\n<h2 class=\"wp-block-heading\">Case 2: Fake banking app targeting payment card details<\/h2>\n<p>Similar to the first case, the second case involves a fraudulent app that deceives users into providing personal information. Unlike the first case, the banking trojan in the second case is capable of stealing credit card details, putting users at risk of financial fraud. User information targeted by the fraudulent app to be sent to the attacker\u2019s C2 includes:<\/p>\n<ul>\n<li>Personal information \u2013 Name, email ID, mobile number, date of birth<\/li>\n<li>Payment information \u2013 Card details (16-digit number, CVV number, card expiration date)&nbsp;<\/li>\n<li>Incoming SMS&nbsp;<\/li>\n<\/ul>\n<h3 class=\"wp-block-heading\">What users see<\/h3>\n<p>When the user interacts with the app, it displays a launch screen featuring the app icon and prompting the user to grant SMS-based permissions. Once the requested permissions are enabled, the app displays a form for the user to enter their personal details, including their name, email address, mobile number, and date of birth. The data provided by the user is then sent to C2 server. After this, the app displays a form for the user to enter their credit card details, including the 16-digit card number, CVV number, and card expiration date, which is also sent to the attacker\u2019s C2.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-13.-Fake-app-collects-SMS-permissions-personal-details-and-card-details-1.webp\" alt=\"Three mobile screenshots from left to right: A fake app requesting SMS permissions, followed by requesting users' personal details, followed by their card details.\" class=\"wp-image-132464 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-13.-Fake-app-collects-SMS-permissions-personal-details-and-card-details-1.webp\"><figcaption class=\"wp-element-caption\"><em>Figure 13. Fake app collects SMS permissions, personal details and card details.<\/em><\/figcaption><\/figure>\n<h3 class=\"wp-block-heading\">Additional features in some versions<\/h3>\n<p>In related campaigns, we observed some versions of the same malicious app include additional features and capabilities, such as capturing:<\/p>\n<ul>\n<li>Financial information \u2013 Bank details, bank ID, card details<\/li>\n<li>Personal information \u2013 PAN card, Aadhar number, permanent address, state, country, pin code, income<\/li>\n<li>Verifying and stealing one-time passwords (OTPs)<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">Similar campaigns<\/h2>\n<p>Based on our telemetry, we have been observing similar campaigns using the names of legitimate organizations in the banking, government services, and utilities sectors, as app file names to target Indian mobile users. Like the two cases discussed above, these campaigns involve sharing the fraudulent apps through WhatsApp and Telegram, and possibly other social media platforms. Moreover, these campaigns select legitimate and even well-known institutions and services in the region to imitate and lure users into a false sense of security. Spoofing and impersonating legitimate organizations and official services is a common social engineering tactic for information-stealing malware. While these banks and other organizations themselves are not affected by the attack directly, attackers often target customers by imitating legitimate entities.<\/p>\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n<p>Mobile banking trojan infections can pose significant risks to users\u2019 personal information, privacy, device integrity, and financial security. As the campaigns discussed in this blog display, these threats can often disguise themselves as legitimate apps and deploy social engineering tactics to achieve their goals and steal users\u2019 sensitive data and financial assets. Being aware of the risks and common tactics used by banking trojans and other mobile malware can help users identify signs of infection and take appropriate action to mitigate the impacts of these threats.<\/p>\n<p>Finding unfamiliar installed apps, increased data usage or battery drain, unauthorized transactions or account settings changes, device crashes, slow performance, unexpected pop-ups, and other unusual app behaviors can indicate a possible banking trojan infection. To help prevent such threats, we recommend the following precautionary measures:<\/p>\n<ul>\n<li>Only install apps from trusted sources and official stores, like the Google Play Store and Apple App Store.<\/li>\n<li>Never click on unknown links received through ads, SMS messages, emails, or similar untrusted sources.<\/li>\n<li>Use mobile solutions such as <a href=\"https:\/\/learn.microsoft.com\/microsoft-365\/security\/defender-endpoint\/microsoft-defender-endpoint-android?view=o365-worldwide\">Microsoft Defender for Endpoint on Android<\/a> to detect malicious applications<\/li>\n<li>Always keep <em>Install unknown apps<\/em> disabled on the Android device to prevent apps from being installed from unknown sources.<\/li>\n<\/ul>\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-13.-Install-unknown-apps-on-Android-1-1024x996.webp\" alt=\"Two mobile screenshots from left to right: Example of the Install unknown apps feature on an Android device, disabling the ability for WhatsApp to install unknown apps. \" class=\"wp-image-132465 webp-format\" style=\"aspect-ratio:1.0281124497991967;width:602px;height:auto\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-13.-Install-unknown-apps-on-Android-1-1024x996.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-13.-Install-unknown-apps-on-Android-1-300x292.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-13.-Install-unknown-apps-on-Android-1-768x747.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-13.-Install-unknown-apps-on-Android-1-1536x1494.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-13.-Install-unknown-apps-on-Android-1-2048x1992.webp 2048w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Figure-13.-Install-unknown-apps-on-Android-1-1024x996.webp\"><figcaption class=\"wp-element-caption\"><em>Figure 14. Example of the Install unknown apps feature on an Android device<\/em><\/figcaption><\/figure>\n<p>Additionally, various Indian banks, governments services, and other organizations are conducting security awareness campaigns on social media using promotional videos to educate users and help combat the ongoing threat presented by these mobile banking trojan campaigns.<\/p>\n<\/p>\n<p><strong><em>Abhishek Pustakala, Harshita Tripathi, and Shivang Desai<\/em><\/strong><\/p>\n<p><em>Microsoft Threat Intelligence<\/em><\/p>\n<\/p>\n<h2 class=\"wp-block-heading\">Appendix<\/h2>\n<h3 class=\"wp-block-heading\">Microsoft 365 Defender detections<\/h3>\n<p>Microsoft Defender Antivirus and Microsoft Defender for Endpoint on Android detect these threats as the following malware:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=Trojan:AndroidOS\/Banker.U&amp;threatId=-2147078305\">Trojan:AndroidOS\/Banker.U<\/a><\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=Trojan:AndroidOS\/Rewardsteal.S&amp;threatId=-2147079101\">Trojan:AndroidOS\/RewardSteal.S&nbsp;<\/a><\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=Trojan:AndroidOS\/Rewardsteal.I&amp;threatId=-2147114562\">Trojan:AndroidOS\/RewardSteal.I<\/a><\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=TrojanSpy:AndroidOS\/SpyBanker.Y&amp;threatId=-2147135024\">TrojanSpy:AndroidOS\/SpyBanker.Y<\/a><\/li>\n<\/ul>\n<h3 class=\"wp-block-heading\">Indicators of compromise<\/h3>\n<figure class=\"wp-block-table table\">\n<table class=\"has-fixed-layout\">\n<tbody>\n<tr>\n<td><strong>SHA256&nbsp;<\/strong><\/td>\n<td><strong>Description&nbsp;<\/strong><\/td>\n<td><strong>Threat Name<\/strong><\/td>\n<\/tr>\n<tr>\n<td>6812a82edcb49131a990acd88ed5f6d73da9f536b60ee751184f27265ea769ee<strong><\/strong><\/td>\n<td>Malicious APK&nbsp;<\/td>\n<td>Trojan:AndroidOS\/Banker.U<\/td>\n<\/tr>\n<tr>\n<td>34cdc6ef199b4c50ee80eb0efce13a63a9a0e6bee9c23610456e913bf78272a8<\/td>\n<td>Malicious APK&nbsp;<\/td>\n<td>TrojanSpy:AndroidOS\/SpyBanker.Y<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<h3 class=\"wp-block-heading\">MITRE ATT&amp;CK techniques<\/h3>\n<figure class=\"wp-block-table table\">\n<table>\n<tbody>\n<tr>\n<td><strong>Execution&nbsp;<\/strong><strong><\/strong><\/td>\n<td><strong>Defense Evasion<\/strong><strong><\/strong><\/td>\n<td><strong>Credential Access<\/strong><strong><\/strong><\/td>\n<td><strong>Collection&nbsp;<\/strong><strong><\/strong><\/td>\n<td><strong>Exfiltration\u202f&nbsp;<\/strong><strong><\/strong><\/td>\n<td><strong>Impact<\/strong><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1603\/\" target=\"_blank\" rel=\"noreferrer noopener\">Scheduled Task\/Job<\/a><strong>&nbsp;<\/strong><\/td>\n<td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1406\/\" target=\"_blank\" rel=\"noreferrer noopener\">Obfuscated Files\/Information<\/a><\/td>\n<td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1417\/\" target=\"_blank\" rel=\"noreferrer noopener\">Input Capture<\/a><\/td>\n<td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1636\/004\/\" target=\"_blank\" rel=\"noreferrer noopener\">Protected User Data: SMS Messages&nbsp;<\/a><\/td>\n<td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1646\/\" target=\"_blank\" rel=\"noreferrer noopener\">Exfiltration Over C2 Channel\u202f&nbsp;<\/a><\/td>\n<td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1582\/\" target=\"_blank\" rel=\"noreferrer noopener\">SMS Control<\/a><\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1628\/001\/\" target=\"_blank\" rel=\"noreferrer noopener\">Hide Artifacts: Suppress Application Icon<\/a><\/td>\n<td><\/td>\n<td>&nbsp;<\/td>\n<td>\u202f&nbsp;<\/td>\n<td>&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<h3 class=\"wp-block-heading\">References<\/h3>\n<ul>\n<li><a href=\"https:\/\/developer.android.com\/guide\/topics\/permissions\/overview#dangerous_permissions\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/developer.android.com\/guide\/topics\/permissions\/overview#dangerous_permissions<\/a><\/li>\n<\/ul>\n<h3 class=\"wp-block-heading\">Acknowledgments<\/h3>\n<ul>\n<li><a href=\"https:\/\/cyble.com\/blog\/new-wave-of-finacial-fraud-scammers-monitoring-social-media-complaints\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/cyble.com\/blog\/new-wave-of-finacial-fraud-scammers-monitoring-social-media-complaints\/<\/a> &nbsp;<\/li>\n<\/ul>\n<h3 class=\"wp-block-heading\">Further reading<\/h3>\n<p>For the latest security research from the Microsoft Threat Intelligence community, check out the Microsoft Threat Intelligence Blog:&nbsp;<a href=\"https:\/\/aka.ms\/threatintelblog\">https:\/\/aka.ms\/threatintelblog<\/a>.<\/p>\n<p>To get notified about new publications and to join discussions on social media, follow us on X (formerly)Twitter at&nbsp;<a href=\"https:\/\/twitter.com\/MsftSecIntel\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/twitter.com\/MsftSecIntel<\/a>.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/20\/social-engineering-attacks-lure-indian-users-to-install-android-banking-trojans\/\">Social engineering attacks lure Indian users to install Android banking trojans<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/20\/social-engineering-attacks-lure-indian-users-to-install-android-banking-trojans\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Microsoft Threat Intelligence| Date: Tue, 21 Nov 2023 04:30:00 +0000<\/strong><\/p>\n<p>Microsoft has observed ongoing activity from mobile banking trojan campaigns targeting users in India with social media messages and malicious applications designed to impersonate legitimate organizations and steal users\u2019 information for financial fraud scams. <\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/20\/social-engineering-attacks-lure-indian-users-to-install-android-banking-trojans\/\">Social engineering attacks lure Indian users to install Android banking trojans<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[10462,21863],"class_list":["post-23436","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-android","tag-credential-theft"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23436","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23436"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23436\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23436"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23436"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}