New Banking Trojan Antidot Targets Android Users with Clever Fake Google Play Update

https://icaro.icaromediagroup.com/system/images/photos/16239566/original/open-uri20240602-56-1aw64k8?1717356999
ICARO Media Group
News
02/06/2024 19h16

Security researchers have uncovered a new banking Trojan called "Antidot" that specifically targets Android phone and tablet users in multiple language-speaking regions. The malware tricks users into granting Accessibility permissions, allowing it to steal money from banking applications installed on their devices.

To convince users to hand over these permissions, hackers have disguised Antidot as a Google Play update. The Trojan presents a counterfeit terms and conditions page that prompts Android users to accept Google's latest policy and initiate the installation process. Researchers have found examples of the fraudulent Google Play Store disclaimer in various languages, including German, French, Spanish, Russian, Portuguese, and Romanian, suggesting a wide range of targeted regions.

During the fake installation process, the counterfeit Google Play Store app asks for a variety of permissions across the Android operating system. These permissions include the ability to perform gestures and actions, view the contents of any application on-screen, and receive notifications when interacting with specific applications. This level of access goes well beyond what is normal for a legitimate app, raising red flags for users who are vigilant about their device's security.

Unlike legitimate apps, Antidot is not available for download from the Google Play Store, making it harder to detect the deception. Instead, security experts from Cyble have discovered that the banking Trojan is being spread through phishing messages. These messages are distributed via SMS and emails directly to users' mobile devices.

To install Antidot, victims are required to sideload the banking Trojan as an APK file. This sideloading process requires users to grant necessary permissions by delving into the Settings menu of their Android devices. As a precaution, users are advised to ignore any links to APK files, particularly if they do not regularly install software from sources outside of the Google Play Store.

It is crucial for users to remain suspicious of any application that demands an excessive number of permissions, especially if the requested access seems unrelated to the app's primary function. While it may be reasonable for a navigation app, for example, to require access to the user's location, alarm bells should go off if an app starts requesting permission to read text messages or access the device's camera.

The discovery of Antidot highlights the ongoing challenges faced by Android users and the constant need for vigilance against evolving cyber threats. Users are urged to exercise caution when downloading apps and to keep their devices protected with up-to-date security measures.

Date: The discovery of the Antidot malware was made recently by security researchers.

Note: The article was written based on the provided information and does not reflect any real-world events or news.

The views expressed in this article do not reflect the opinion of ICARO, or any of its affiliates.

Related