City
Epaper

New malware 'SharkBot' attacking banking apps on Android phones

By IANS | Updated: November 16, 2021 17:25 IST

New Delhi, Nov 16 Cybersecurity researchers have discovered a new Android Trojan that can circumvent multi-factor authentication on ...

Open in App

New Delhi, Nov 16 Cybersecurity researchers have discovered a new Android Trojan that can circumvent multi-factor authentication on banking apps on smartphones, putting users' financial data and money at risk.

Called 'SharkBot', the Android malware has been found in attacks across Europe and the US, focused on stealing funds from mobile phones running the Google Android operating system.

"The main goal of SharkBot is to initiate money transfers from the compromised devices via Automatic Transfer Systems (ATS) technique bypassing multi-factor authentication mechanisms," the researchers from cyber security firm Cleafy said in a statement.

"These mechanisms are used to enforce users' identity verification and authentication, and are usually combined with behavioural detection techniques to identify suspicious money transfers," the team added.

'SharkBot' appears to have a very low detection rate by antivirus solutions since multiple anti-analysis techniques have been implemented.

"Once SharkBot is successfully installed in the victim's device, attackers can obtain sensitive banking information through the abuse of Accessibility Services, such as credentials, personal information, current balance, etc., but also to perform gestures on the infected device," the researchers informed.

'SharkBot' belongs to a "new" generation of mobile malware, as it is able to perform ATS attacks inside the infected device.

This technique has already been seen recently from other banking trojans, such as Gustuff.

ATS (Automatic Transfer System) is an advanced attack technique (fairly new on Android) which enables attackers to auto-fill fields in legitimate mobile banking apps and initiate money transfers from the compromised devices.

The malicious app is installed on the users' devices using both the side-loading technique and social engineering schemes, the report said.

Disclaimer: This post has been auto-published from an agency feed without any modifications to the text and has not been reviewed by an editor

Tags: Automatic transmission fluidusgoogleNew DelhiWord on macThe new delhi municipal councilWho dgDelhi south-westMicrosoft incUs google & youtubeSk dua
Open in App

Related Stories

InternationalUS Government Shutdown: US Embassy in India’s X Account to Pause Regular Updates Until Full Operations Resume

TechnologyGoogle Birthday Doodle: Search Engine Giant Brings Back 1998 Logo as It Turns 27 Today

CricketIND-W vs AUS-W, 3rd ODI: Australia Women Win Toss, Opt to Bat Against India in Series Decider; Check Playing XIs

CricketWhy Is India Women’s Cricket Team Wearing a Pink Jersey in IND-W vs AUS-W 3rd ODI 2025 Match?

CricketIND-W vs AUS-W 3rd ODI LIVE Cricket Streaming: When and Where to Watch India Women vs Australia Women Final Match

National Realted Stories

NationalWeather department warns of heavy rain in northern TN for three days

NationalPadma Bhushan Awardee Pandit Chhannulal Mishra passes away, PM Modi expresses grief

NationalCentre likely to double Vijay's security as BJP, AIADMK seek to reshape TN politics after Karur tragedy

NationalPM Modi pays tributes to Mahatma Gandhi, Lal Bahadur Shastri on their birth anniversary

NationalPM Modi to attend Dussehra celebrations in East Delhi