City
Epaper

Android malware in Google Play stealing users' data, SMS texts

By IANS | Updated: March 4, 2022 13:05 IST

New Delhi, March 4 A dangerous Android banking malware that steals victim's credentials and SMS messages has been ...

Open in App

New Delhi, March 4 A dangerous Android banking malware that steals victim's credentials and SMS messages has been downloaded thousands of times via Google Play Store, researchers have warned.

Called 'TeaBot,' it is an Android banking trojan that first emerged at the beginning of 2021 designed for stealing victim's text messages.

Initially, TeaBot has been distributed through smishing campaigns using a predefined list of lures, such as TeaTV, VLC Media Player, DHL and UPS and others, according to online fraud management and prevention solution provider Cleafy.

"In the last months, we detected a major increase of targets which now count more than 400 applications, including banks, crypto exchanges/wallets and digital insurance, and new countries such as Russia, Hong Kong, and the US," the researchers informed.

During the last months, TeaBot has also started supporting new languages, such as Russian, Slovak and Mandarin Chinese, useful for displaying custom messages during the installation phases.

On February 21, the Cleafy Threat Intelligence and Incident Response (TIR) team discovered an application published on the official Google Play Store, which was acting as a dropper application delivering TeaBot with a fake update procedure.

"The dropper lies behind a common QR Code & Barcode Scanner and it has been downloaded more than 10,000 times. All the reviews display the app as legitimate and well-functioning," the team noted.

However, once downloaded, the dropper will request an update immediately through a popup message.

Unlike legitimate apps that perform the updates through the official Google Play Store, the dropper application will request to download and install a second application.

This application has been detected to be TeaBot.

TeaBot, posing as "QR Code Scanner: Add-On", is downloaded from two specific GitHub repositories.

Once the users accept to download and execute the fake "update", TeaBot will start its installation process by requesting the 'Accessibility Services' permissions in order to obtain the privileges needed.

One of the biggest differences, compared to the samples discovered during May 2021, is the increase of targeted applications which now include home banking applications, insurance applications, crypto wallets and crypto exchanges.

"In less than a year, the number of applications targeted by TeaBot have grown more than 500 per cent, going from 60 targets to over 400," the team said.

Google Play was yet to comment on the report.

Disclaimer: This post has been auto-published from an agency feed without any modifications to the text and has not been reviewed by an editor

Tags: VLC media playerNew DelhiGoogle Play StoreHong KongThe new delhi municipal councilDelhi south-west
Open in App

Related Stories

NationalAir India Flight to Delhi Returns to Hong Kong After Pilots Detect Possible Technical Problem

NationalCOVID-19 Situation in India Under Control, Say Official Sources Amid Scare in Singapore, Hong Kong

MumbaiMumbai; BMC Issues Advisory After Two COVID-19 Deaths, Assures Public of Preparedness

Social ViralViral Video: Snake Found Inside Train Toilet, Internet Reacts

EntertainmentAjith Kumar Injured in Fan Frenzy After Padma Bhushan Award Ceremony, Actor Hospitalized In Chennai

Technology Realted Stories

TechnologyIPO-bound Waterways Leisure Tourism swings to Rs 120 crore loss in FY24, revenue slides

TechnologyCentre kicks off ‘GST Pakhwada’ to mark 8 years of tax reforms

TechnologyJPMorgan downgrades HDFC AMC to 'neutral', sees slower growth ahead

TechnologyBomb threat to Sriharikota Space Centre sends security agencies into a tizzy

TechnologySwaLay Partners with Spotify for Smarter Publishing and Data