Malware experts from the Italian cybersecurity firm Cleafy have spotted a new Android banking trojan dubbed TeaBot (aka Anatsa) that is targeting banks in Spain, Germany, Italy, Belgium, and the Netherlands.
TeaBot malware appeared in the threat landscape at the beginning of January 2021, it is still under development and according to the researchers, it is able to hijack users’ credentials and SMS messages.
The researchers detected on 29th March 2021, for the first time the inclusion of injections against Italian
banks, and in May the malware targeted Belgium and Netherlands banks.
TeaBot supports the main features of Android banking Trojan and like other similar malware families it abuses
Accessibility Services. Below a list of features implemented by the malware:
“The main goal of TeaBot is stealing victim’s credentials and SMS messages for enabling frauds scenarios against a predefined list of banks,” reads the analysis published by Cleafy. “Once TeaBot is successfully installed in the victim’s device, attackers can obtain a live streaming of the device screen (on demand) and also interact with it via Accessibility Services.”
The malicious app masquerades as media and shipment services such as TeaTV, VLC MediaPlayer, Mobdro, DHL, and UPS. Upon launching the app it will download and execute a second-stage payload then it tricks the victim into granting it accessibility service permissions.
TeaBot leverages accessibility service permissions to achieve real-time interaction with the compromised device, to record keystrokes, take screenshots, and perform overlay attacks against multiple bank apps to steal sensitive data.
The report published by the experts also includes IoCs for the threat.
Follow me on Twitter: @securityaffairs and Facebook
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, Android)
[adrotate banner=”5″]
[adrotate banner=”13″]
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…
This website uses cookies.