Malware

BankBot Trojan bypasses again security checks implemented by Google for the Play Store

Experts from several security firms has spotted two new malware campaigns targeting Google Play Store users, once of them spreads the BankBot Trojan.

Once again crooks succeeded in publishing a malware in the official Google Play Store deceiving the anti-malware protections implemented by the tech giant.

A team composed of security experts from several security firms has spotted two new malware campaigns targeting Google Play Store users, once of them is spreading a new version of the infamous BankBot banking Trojan.

The BankBot banking Trojan creates phishing login overlays for several real banking applications (i.e. Citibank, WellsFargo, Chase, and DiBa) in efforts to steal users’ login details, it also uses the same technique to steal credentials for many popular apps, including Facebook, WhatsApp, Instagram, Twitter, Youtube, Snapchat, Viber, WeChat, and Uber.

The android malware is also able to intercept text messages and delete them from the victim’s device, in this way it could bypass 2FA implemented by banks.

Google removed at least four previous versions of this banking trojan from the Play Store from the beginning of the year, but crooks always succeeded in proposing a new variant infecting victims of major banks worldwide.

Experts found a second campaign that spreads the same BankBot trojan alongside with the Mazar and Red Alert malware.

“Another set of malicious apps has made it into the official Android app store. Detected by ESET security systems as Android/TrojanDropper.Agent.BKY, these apps form a new family of multi-stage Android malware, legitimate-looking and with delayed onset of malicious activity.” reads the analysis published by ESET.

“We have discovered eight apps of this malware family on Google Play and notified Google’s security team about the issue. Google has removed all eight apps from its store; users with Google Play Protect enabled are protected via this mechanism.”

Researchers from security firms ESET, AVAST, and SfyLabs shared their knowledge on the threat and wrote a joint report.

The latest variant of the BankBot Trojan has been hiding in Android apps that pose as supposedly harmless flashlight apps.

The experts first spotted the malicious apps on October 13, the apps use special techniques to circumvent Google automated detection checks such as delaying the malicious activities of 2 hours after the user gave device admin rights to the application.

When the malware is first started, it will check the installed app against a hardcoded list of 160 apps, including apps from Wells Fargo and Chase in the U.S., Credit Agricole in France, Santander in Spain, Commerzbank in Germany and many other financial institutions from around the world.

When the dropper finds one or more apps on the infected device, it downloads and installs the BankBot APK from the C&C server on the device, and trick the victim into giving it administrator rights by pretending to be a Play Store or system update.

The admin privileges allow the BankBot app to display overlay on the top of legitimate apps.

The Avast Threat Labs published a video PoC to show how the app creates an overlay within milliseconds and tricks the user into giving out their bank details to criminals.

Researchers explained that the latest version of the BankBot Trojan does not utilize the Accessibility Service feature that was recently blocked by Google feature for all applications, except those designed to provide services for the blind.

“Unlike this newer version of BankBot, droppers from previous campaigns were far more sophisticated. They applied techniques such as performing clicks in the background via an Accessibility Service to enable the installation from unknown sources. Google blocked this service for all applications this fall, except those designed to provide services for the blind. Therefore, the new BankBot version cannot utilize this mechanism any more.” states AVAST.

Further technical details are included in the reports published by the security firms involved in the investigation on both campaigns.

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs – mobile, BankBot Trojan)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

19 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

20 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.