Works on android versions 5 – 12.
1-RAT 2-SPAM SMS 3-GET FULL CONTACT AND SEND SMS 4-GET ALL SMS 5-READ ALL SMS 6-READ ALL APPLICATIONS INSTALLED 7-IF BANKING SERVICE IS ACTIVE, YOU CAN SEE ALL BANK APPLICATIONS 8-REMOVE FROM PANEL AND UNINSTALL RAT (IF YOU WANT) 9-OPEN URL IN WEB BROWSER OR HIDDEN BROWSER 10-SOCKS5 CONNECTIONS 11-GET BANK INFO WITH MORE INJECTION he malware targets European banking applications and adds devices to its botnet. first revealed details about the
An Android malware that was observed abusing accessibility services in the device to hijack user credentials from European banking applications has morphed into an entirely new botnet as part of a renewed to Anonymousexploit
Ubel Android Banking Botnet analyzing some related samples, we found multiple indicators linking Oscorp and UBEL to the same malicious codebase, suggesting a fork of the same original project or just a rebrand by other affiliates, as its source-code appears to be shared between multiple [threat actors],” Italian cybersecurity company Cleafy said Tuesday, charting the malware’s evolution
Advertised on underground forums for $980, UBEL, like its predecessor, requests for intrusive permissions that allows it to read and send SMS messages, record audio, install and delete applications, launch itself automatically after system boot, and abuse accessibility services on Android to amass sensitive information from the device such as login credentials and two-factor authentication codes, the results of which are exfiltrated back to a remote server.
Once downloaded on the device, the malware attempts to install itself as a service and hide its presence from the target, thereby achieving persistence for extended periods of time
nterestingly, the use of WebRTC to interact with the compromised Android phone in real-time circumvents the need to enroll a new device and take over an account to perform fraudulent activities.
“The main goal for this [threat actor] by using this feature, is to avoid a ‘new device enrollment’, thus drastically reducing the possibility of being flagged ‘as suspicious’ since device’s fingerprinting indicators are well-known from the bank’s perspective,” the researchers said.
There are no reviews yet.