TrickMo Banking Trojan Can Now Seize Android PINs and Unlock Patterns

Oct 15, 2024Ravie LakshmananMobile Security / Financial Fraud

New versions of an Android banking trojan known as TrickMo have been discovered to possess previously unrecorded capabilities to snatch a device’s unlock pattern or PIN.

TrickMo Banking Trojan Can Now Capture Android PINs and Unlock Patterns

Oct 15, 2024Ravie LakshmananMobile Security / Financial Fraud

TrickMo Banking Trojan Can Now Capture Android PINs and Unlock Patterns

New versions of an Android banking trojan known as TrickMo have been discovered to possess previously unrecorded capabilities to snatch a device’s unlock pattern or PIN.

Regarding this new feature, Zimperium security researcher Aazim Yaswant stated in a recent analysis that “The addition of this functionality allows the malicious actor to operate on the device even when it is secured and locked.”

Initially identified in the wild in 2019, TrickMo derives its name from its links to the TrickBot cybercrime faction and can enable remote access to compromised devices, as well as pilfering OTPs sent via SMS and showing overlay screens to acquire login credentials by exploiting Android’s accessibility services.

In a recent disclosure, the Italian cybersecurity firm Cleafy highlighted updated iterations of the mobile malware with enhanced tactics to dodge analysis and gain supplementary permissions to carry out unauthorized activities on the device, including executing illicit financial transactions.

Cybersecurity

Several of the recent mutations of the malicious software have also been outfitted to collect the device’s unlock pattern or PIN by displaying to the user a deceptive User Interface (UI) that emulates the legitimate unlock screen of the device.

The UI is crafted as an HTML page hosted on an external website and exhibited in full-screen mode, creating the illusion of a genuine unlock screen.

If unwitting users enter their unlock pattern or PIN, along with a distinct device identifier, this data is sent to a server controlled by the attacker (“android.ipgeo[.]at“) in the form of an HTTP POST request.

Zimperium highlighted that the insufficient security measures on the C2 servers enabled a peek into the types of data stored within them, which include records with roughly 13,000 distinct IP addresses, predominantly geolocated in Canada, the U.A.E., Turkey, and Germany.

TrickMo Banking Trojan

“These stolen credentials encompass not just banking details but also extend to those utilized for accessing corporate assets like VPNs and internal web portals,” emphasized Yaswant. “This emphasizes the critical importance of safeguarding mobile devices, given their potential as a primary ingress point for cyber breaches on organizations.”

Another noteworthy aspect is the expansive scope of TrickMo’s target base, gathering information from apps across multiple genres such as finance, business, employment, online shopping, stock trading, social networking, video streaming, gaming, secured network access tools, government services, educational resources, telecommunication utilities, and medical institutions.

This development occurs amidst the emergence of a fresh ErrorFather Android banking trojan campaign that utilizes a variant of Cerberus for perpetrating financial deception.

Cybersecurity

“The appearance of ErrorFather underscores the persistent threat posed by repurposed malware, as cybercriminals persist in exploiting leaked source code long after the original Cerberus malware was exposed,” as stated by the Broadcom-owned Symantec commentary.

Based on findings from Zscaler ThreatLabz, financially-motivated mobile attacks involving banking malware have witnessed a 29% surge during the period between June 2023 to April 2024, compared to the preceding year.

India emerged as the primary target for mobile attacks within this timeframe, enduring 28% of all attacks, with the United States, Canada, South Africa, the Netherlands, Mexico, Brazil, Nigeria, Singapore, and the Philippines following suit.

Found this article intriguing? Stay updated with our latest content by following us on Twitter and LinkedIn.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.