Modified Version of BrazKing Malware Back as Banking Trojan

Share post:

A modified version of Android malware has been discovered by IBM Trusteer researchers on websites where users end up after getting smishing (SMS) messages.

The BrazKing Android Banking Trojan offers modified and new tactics that ensure smooth operation without risky permission requests. It uses the screen dissection function to show which apps are installed on an infected device.

This overlay ensures that it connects to the command and control server to get the correct login credentials when using the bank app. Its ability to steal 2FA codes, login credentials and screenshots, bypassing various permissions makes it a very powerful banking Trojan.

During the installation process, users are prompted to update their device to the latest version as soon as they arrive at corrupt third-party websites.

If a user agrees to the “download from unknown sources” option, the malware is dropped on the device after which they request access to the ‘Accessibility Service.” Once permission is granted, the malware will then be able to carry out various malicious actions including dissecting the screen programmatically; keylogger capacities; RAT capabilities; reading SMS without the ‘android.permission.READ_SMS’ permission, and reading contact lists without ‘android.permission.READ_CONTACTS’ permission.’

For more information, read the original story in Bleeping Computer.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cyber Security Today, March 27, 2024 – A botnet exploits old routers, a new malware loader discovered, and more warnings about downloading code from...

This episode reports on a new network of 40,000 infected small and home office routers and other devices that are part of a criminal botnet

Cyber Security Today, March 25, 2024 – A suspected China threat actor going after unpatched F5 and ScreenConnet installations

This episode reports on a new campaign stealing email passwords ,the latest data breaches

A hacker’s view of the civic infrastructure: Hashtag Trending, the Weekend Edition for March 23rd, 2024

What does the civic infrastructure look like through the eyes of a hacker? The legendary general Sun Tzu in the Art of War said that in order to defeat your enemy, you must first understand your enemy. How do you do this? He said, “to know your enemy, you must become your enemy.” If we

Cyber Security Today, Week in Review for week ending Friday, March 22, 2024

This episode features discussion on lessons learned from the ransomware attack on the British Library, advice for managing expectations of IT/security teams, why firms are leaving Google Firebase unprotecte

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways