{"id":35131,"date":"2022-09-05T03:40:52","date_gmt":"2022-09-05T07:40:52","guid":{"rendered":"https:\/\/coinscreed.com\/staging\/?p=35131"},"modified":"2022-09-05T03:40:54","modified_gmt":"2022-09-05T07:40:54","slug":"sharkbot-malware-reappears-on-google-play-store","status":"publish","type":"post","link":"https:\/\/coinscreed.com\/staging\/sharkbot-malware-reappears-on-google-play-store\/","title":{"rendered":"SharkBot malware reappears on Google Play store"},"content":{"rendered":"\n<h5 class=\"wp-block-heading\" id=\"h-sharkbot-malware-which-was-found-last-october-has-continued-to-expand-with-new-ways-to-hack-android-crypto-and-bank-apps\">SharkBot malware which was found last October has continued to expand with new ways to hack Android crypto and bank apps.<\/h5>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/09\/Google-Android-1024x768.webp\" alt=\"SharkBot malware reappears on Google Play store\" class=\"wp-image-35135\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/09\/Google-Android-1024x768.webp 1024w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/09\/Google-Android-300x225.webp 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/09\/Google-Android-768x576.webp 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/09\/Google-Android-150x113.webp 150w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/09\/Google-Android-750x563.webp 750w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/09\/Google-Android-1140x855.webp 1140w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/09\/Google-Android.webp 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption>SharkBot malware reappears on Google Play store<\/figcaption><\/figure>\n\n\n\n<p>Recently, a banking and cryptocurrency software that targets <a href=\"https:\/\/coinscreed.com\/staging\/crypto-mining-malware-infects-miners-on-112000-pcs.html\" target=\"_blank\" rel=\"noreferrer noopener\">malware <\/a>reappeared on the Google Play store with an updated version that can now steal cookies from account logins and get through fingerprint or authentication constraints.<\/p>\n\n\n\n<p>On September 2, malware analyst Alberto Segura and treat intelligence analyst Mike Stokkel tweeted a warning about the latest version of the malware on their Twitter accounts, linking to a report they co-authored for Fox IT.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"embed-twitter\"><blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">We discovered a new version of <a href=\"https:\/\/twitter.com\/hashtag\/SharkbotDropper?src=hash&ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">#SharkbotDropper<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"wpil-svg-outbound-7-icon-path\" fill=\"none\" clip-path=\"url(#clip0_31_188)\">\r\n                            <path d=\"M9.16724 14.8891L20.1672 3.88908\" stroke-linecap=\"round\"\/>\r\n                            <path d=\"M13.4497 3.53554L20.5208 3.53554L20.5208 10.6066\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\r\n                            <path d=\"M17.5 13.5L17.5 16.26C17.5 17.4179 17.5 17.9968 17.2675 18.4359C17.0799 18.7902 16.7902 19.0799 16.4359 19.2675C15.9968 19.5 15.4179 19.5 14.26 19.5L7.74 19.5C6.58213 19.5 6.0032 19.5 5.56414 19.2675C5.20983 19.0799 4.92007 18.7902 4.73247 18.4359C4.5 17.9968 4.5 17.4179 4.5 16.26L4.5 9.74C4.5 8.58213 4.5 8.0032 4.73247 7.56414C4.92007 7.20983 5.20982 6.92007 5.56414 6.73247C6.0032 6.5 6.58213 6.5 7.74 6.5L11 6.5\" stroke-linecap=\"round\"\/>\r\n                        <\/g>\r\n                        <defs>\r\n                            <clipPath id=\"clip0_31_188\">\r\n                                <rect fill=\"white\" height=\"24\" width=\"24\"\/>\r\n                            <\/clipPath>\r\n                        <\/defs><\/svg><\/span><\/a> in Google Play used to download and install <a href=\"https:\/\/twitter.com\/hashtag\/Sharkbot?src=hash&ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">#Sharkbot<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a>! The found droppers were used in a campaign targeting UK and IT! Great work <a href=\"https:\/\/twitter.com\/Mike_stokkel?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">@Mike_stokkel<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a>! <a href=\"https:\/\/t.co\/uXt7qgcCXb\" target=\"_blank\">https:\/\/t.co\/uXt7qgcCXb<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/p>&mdash; Alberto Segura (@alberto__segura) <a href=\"https:\/\/twitter.com\/alberto__segura\/status\/1565659523339227137?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">September 2, 2022<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/div>\n<\/div><\/figure>\n\n\n\n<p>The <a href=\"https:\/\/www.google.com\/search?q=SharkBot+malware+reappears+on+Google+Play+store&oq=SharkBot+malware+reappears+on+Google+Play+store&aqs=chrome..69i57.1008j0j9&sourceid=chrome&ie=UTF-8\" target=\"_blank\" rel=\"noreferrer noopener\">new malware<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a>, which Segura claims was found on August 22, has the ability to &#8220;perform overlay attacks, steal data through keylogging, intercept SMS messages, or give threat actors complete remote control of the host device by abusing the Accessibility Services,&#8221; among other things.<\/p>\n\n\n\n<p>Two Android apps, &#8220;Mister Phone Cleaner&#8221; and &#8220;Kylhavy Mobile Security,&#8221; which have subsequently had 50,000 and 10,000 downloads, respectively, were found to contain the latest malware version.<\/p>\n\n\n\n<p>As no dangerous code was found by Google's automated code review, the two apps were initially accepted into the <a href=\"https:\/\/coinscreed.com\/staging\/bitcoin-dead-google-searches-reach-all-time-high-last-weekend.html\" target=\"_blank\" rel=\"noreferrer noopener\">Play Store<\/a>. It was later taken out of the shop, though.<\/p>\n\n\n\n<p>The 60,000 users who installed the apps, however, may still be at risk and should manually remove them, according to analysts.<\/p>\n\n\n\n<p>Five cryptocurrency exchanges and a number of foreign institutions in the US, UK, and Italy were among the 22 targets identified by SharkBot, according to an in-depth investigation by the Italian security company Leafy.<\/p>\n\n\n\n<p>The older SharkBot virus &#8220;relied on accessibility permissions to automatically complete the installation of the dropper SharkBot malware,&#8221; according to the malware's mode of attack.<\/p>\n\n\n\n<p>The latest version, however, is distinctive since it &#8220;asks the user to install <a href=\"https:\/\/coinscreed.com\/staging\/cryptocurrency-stealing-malware-pennywise-spreads-via-youtube.html\" target=\"_blank\" rel=\"noreferrer noopener\">the malware<\/a> as a phony update for the antivirus to keep protected against attacks.&#8221;<\/p>\n\n\n\n<p>If SharkBot is installed, it can use the command &#8220;logsCookie&#8221; to steal the victim's legitimate session cookie once they log into their bank or cryptocurrency account, effectively bypassing any fingerprinting or authentication measures.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"embed-twitter\"><blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">This is interesting!<br>Sharkbot Android malware is cancelling the &quot;Log in with your fingerprint&quot; dialogs so that users are forced to enter the username and password<br>(according to <a href=\"https:\/\/twitter.com\/foxit?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">@foxit<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a> blog post) <a href=\"https:\/\/t.co\/fmEfM5h8Gu\" target=\"_blank\">pic.twitter.com\/fmEfM5h8Gu<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/p>&mdash; \u0141ukasz (@maldr0id) <a href=\"https:\/\/twitter.com\/maldr0id\/status\/1566110940717846534?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">September 3, 2022<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/div>\n<\/div><\/figure>\n\n\n\n<p>Cleafy made the initial discovery of the SharkBot <a href=\"https:\/\/coinscreed.com\/staging\/bayc-co-founder-warns-users-of-hack-attempt.html\" target=\"_blank\" rel=\"noreferrer noopener\">virus <\/a>in October 2021.<\/p>\n\n\n\n<p>SharkBot's primary objective, according to Cleafy's first investigation, was &#8220;to begin money transfers from the infected devices via Automatic Transfer Systems (ATS) approach evading multi-factor authentication measures.&#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SharkBot malware which was found last October has continued to expand with new ways to hack Android crypto and bank apps. Recently, a banking and cryptocurrency software that targets malware reappeared on the Google Play store with an updated version that can now steal cookies from account logins and get through fingerprint or authentication constraints. [&hellip;]<\/p>\n","protected":false},"author":38,"featured_media":35135,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[21],"tags":[4231,11256],"class_list":["post-35131","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-malware","tag-sharkbot"],"jetpack_featured_media_url":"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/09\/Google-Android.webp","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/35131","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/comments?post=35131"}],"version-history":[{"count":0,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/35131\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media\/35135"}],"wp:attachment":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media?parent=35131"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/categories?post=35131"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/tags?post=35131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}