New Android Malware Targets 12 Indian Banking Apps and Stealing Login Information: Quick Heal

Follow Us

Quick Heal Security Labs recently detected an Android Trojan Banking which explicitly targets banking apps. As per the report, this new Android malware targets 232 banking apps across the world, and the list includes 12 Indian banking apps from top-tier banks. The malware is known as Android.banker.A2f8a (Previously detected as Android.banker.A9480) as per Quick Heal.

android1




"Like most other Android banking malware, even this one is designed for stealing login credentials, hijacking SMSs, uploading contact lists and SMSs on a malicious server, displaying an overlay screen (to capture details) on top of legitimate apps and carrying out other such malicious activities," said Quick Heal in the report.

The malware Android.banker.A2f8a is being distributed through a fake Flash Player app on third-party stores. Once if the user installs the malicious app, it will keep on asking the user to activate admin rights. "And even if the user denies the request or kills the process, the app will keep throwing continuous pop-ups until the user activates the admin privilege. Once this is done, the malicious app hides its icon soon after the user taps on it," the report added.

Once if the user grants admin rights to the application, the application carries out malicious tasks in the background. If it founds out any of the banking application out of the 232 apps installed on the smartphone, it will throw a fake login page by which it steals the login information.

Furthermore, the malicious application has the ability to intercept all incoming and outgoing SMSs from the infected device with which the attackers bypass the two-factor verification. And it also has the ability to transfer all the SMSs for your inbox to the service.

android-malware-banking
Image: Quick Heal

That's not all; it has a few more functionalities. The malware can also set the device's ringer volume to silent in order to suppress SMS notifications. Here's the list of targeted banks in India:

  • Axis Mobile
  • HDFC Bank MobileBanking
  • SBI Anywhere Personal
  • HDFC Bank MobileBanking LITE
  • iMobile by ICICI Bank
  • IDBI Bank GO Mobile+
  • Abhay by IDBI Bank Ltd
  • IDBI Bank GO Mobile
  • IDBI Bank mPassbook
  • Baroda mPassbook
  • Union Bank Mobile Banking
  • Union Bank Commercial Clients

To stay away from this malicious attack, you should not install any flash player application, especially the ones with Adobe name. The flash player size is reportedly said to be 115KB. Also, Quick Heal noted that their security application detects this malware and alerts the user if any.

Reported By

Managing Editor

Chakri is a go-to guy for your next smartphone recommendation. Back in his engineering days, he used to play with smartphones by installing custom ROMs and that passion got him into the tech industry. He still goes nuts about a smartphone knocking his door for review. Currently managing everything at Telecom Talk, Chakri is trying to master PUBG Mobile in his free time.

Recent Comments

Faraz :

Even though Airtel and Jio both have added almost 200 million 5G customers together, most have upgraded from 4G to…

Airtel Gained Wireless Subscribers Across All Circles in March 2024

Faraz :

I seems so stupid that they came up with backup Wi-Fi plan of 10 Mbps but killed all the data…

Will Indians Stop Using Second SIM After the Next Tariff…

Faraz :

" Vi gives 10 days free validity every month with 7 Days(1GB/day freebie) OG + 3 days IC " They…

Will Indians Stop Using Second SIM After the Next Tariff…

Rupesh :

Analysts are wrong here. Even these days, people are getting rid of secondary sims unless second sim is Jio/Vi. Jio…

Will Indians Stop Using Second SIM After the Next Tariff…

Load More
Subscribe
Notify of
0 Comments
Inline Feedbacks
View all comments