Menu
Source code for powerful Android banking malware is leaked

Source code for powerful Android banking malware is leaked

More attacks are expected as cybercriminals use the code

The source code for a powerful Android malware program that steals online banking credentials has been leaked, according to researchers with IBM.

The malware family is known by several names, including GM Bot, Slempo, Bankosy, Acecard, Slempo and MazarBot. 

GM Bot has been sold on underground hacking forums for around US$500. But it appears someone who bought the code then leaked it on a forum in December, perhaps to increase his standing, wrote Limor Kessem, a cybersecurity analyst with IBM Trusteer.

The person included an encrypted archive file containing the source code of GM Bot, according to Kessem.

"He indicated he would give the password to the archive only to active forum members who approached him," Kessem wrote. "Those who received the password in turn passed it on to other, unintended users, so the actual distribution of the code went well beyond that discussion board’s member list."

The source code of powerful banking trojans has been leaked before with apps such as Zeus, SpyEye and Carberp, Kessem wrote.

"While GM Bot may not be as prolific as the major banking Trojans mentioned here, it is definitely a game changer in the realm of mobile threats," Kessem added.

GM Bot emerged in late 2014 on Russian-speaking forums. It exploits an issue known as activity hijacking in older Android devices that allow an overlay to be displayed over a legitimate application.

Google has put in defenses against activity hijacking in Android versions higher than 5.0.

The overlay looks like what a user would expect to see after launching a legitimate banking app, but that app is actually running underneath the overlay. The user then inputs their authentication credentials, which are sent to the attackers.

Since GM Bot has full control over the device, it can also steal SMSes, such as one-time authentication codes.

"Previous mobile malware — before overlays became commercially available to fraudsters — could steal SMS codes, but those would have been meaningless without phishing schemes or a trojan on the victim’s PC to steal access credentials," Kessem wrote.

Since the leak of GM Bot's code, it appears its creators have developed a second version "which is sold in financial fraud-themed underground boards," Kessem wrote.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Slideshows

IN PICTURES: Ingram Micro Innovation hits Auckland with Hewlett Packard Enterprise

IN PICTURES: Ingram Micro Innovation hits Auckland with Hewlett Packard Enterprise

Ingram Micro completed its nationwide roadshow in Auckland last month, kicking off its Innovation Hour series with Hewlett Packard Enterprise. Uncovering the latest in storage, networking and servers, the event outlined key market trends for resellers in 2016 and beyond.

IN PICTURES: Ingram Micro Innovation hits Auckland with Hewlett Packard Enterprise
IN PICTURES: FireEye celebrates channel at 2016 Partner Conference

IN PICTURES: FireEye celebrates channel at 2016 Partner Conference

FireEye welcomed 143 channel partners and distributors to FireEye's 2016 annual Partner Conference, FireEye A/NZ Momentum - held at Establishment in Sydney. Delegates heard from senior trans-Tasman channel leaders, marketing and the product divisions in the morning, with FireEye customers, incident responders and threat intelligence analysts sharing knowledge during the afternoon.

IN PICTURES: FireEye celebrates channel at 2016 Partner Conference
​IN PICTURES: Disruption in the data centre - Can the Kiwi channel capitalise?​

​IN PICTURES: Disruption in the data centre - Can the Kiwi channel capitalise?​

With New Zealand businesses now open to innovation, the industry sits on the cusp of significant disruption in the data centre. Driven by software-defined networking, the future of the data centre is fast becoming reality, as the channel seeks to keep up, keep innovating and keep growing. APC by Schneider Electric, Lenovo and key partners outlined how the channel can capitalise at The Grill restaurant in Auckland.

​IN PICTURES: Disruption in the data centre - Can the Kiwi channel capitalise?​
Show Comments