{"id":20650,"date":"2020-05-11T16:09:20","date_gmt":"2020-05-11T20:09:20","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=20650"},"modified":"2022-04-27T14:51:39","modified_gmt":"2022-04-27T18:51:39","slug":"android-malware","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/android-malware\/","title":{"rendered":"New Android Malware, \u201cEventbot\u201d Targets Financial Data"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">A pernicious new malware that steals Android mobile banking data has been discovered, and it\u2019s targeting Android users throughout Europe and the United States.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cEventbot\u201d leverages Android accessibility to reap private data from financial applications. It also has the ability to hijack SMS-based two-factor authentication codes, and it can even read user SMS messages. A very foreboding mix of capabilities.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cThis one is especially dangerous,\u201d remarks <strong>Emilio Simoni, Research Director at dfndr lab<\/strong>, \u201cEventbot is a trojan that targets over 200 different financial apps.\u201d Simoni explains that these\u00a0 include banking, money transfer services, and crypto-currency wallets like Coinbase, Paypal Business, TransferWise, HSBC, CapitalOne, Santander, Revolut, and Barclays\u2026 and many more.<\/span><\/p>\n<h3><b>How EVENTBOT Does Its Damage<\/b><\/h3>\n<p><b>\u00a0<\/b><span style=\"font-weight: 400;\">First identified in March 2020, Eventbot makes its way onto phones by posing as a legitimate app: Adobe Flash, Microsoft Word, and similar.\u00a0 Eventbot primarily resides on unofficial Android App stores and other unauthorized websites, it has also been delivered through bulk SMSs and Emails, typically offering special savings on popular Android apps.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When installed, Eventbot requests a robust list of permissions, including accessibility settings; \u201cread\u201d permission from external storage; the ability to send and receive SMS messages; run in the background; and launch after system boot.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Users who grant these permissions unwittingly enable EventBot to operates as a keylogger, which can extract notifications about other installed applications, and scan and scrape the content of open windows. It also further-leverages Android&#8217;s accessibility services to steal the lock-screen PIN \u2014 then sends all of its stolen data in an encrypted format to its command-center server.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Simoni explains: \u201cThe ability to track SMS messages also enables this malware to pass-through SMS-based two-factor authentications, which opens the gates wide for financial attacks of the very worst kind.\u201d<\/span><\/p>\n<h3><b>Protect Yourself<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\u201cIt&#8217;s important to always rely on a security mechanism.<strong> dfndr security<\/strong>, for example, has a <a href=\"psafe:\/\/launch\/safe_installer\"><strong>Safe App Installer<\/strong><\/a> feature that is designed expressly to deal with dangerous apps like this,\u201d Simoni offers, \u201cThis feature lets you know if an app is safe before you ever install it, and its updated constantly by the PSafe security team. We scan the web constantly for updates and information to enrich our database.&#8221;<br \/>\n<\/span><\/p>\n<p>With Safe App Installer, any app you intend to install will be rated for trustworthiness. There are two levels of alert if the feature discovers an issue:<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>Security Alert:<\/b><span style=\"font-weight: 400;\"> If the app is malware;<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Privacy Alert:<\/b><span style=\"font-weight: 400;\"> If the app already experienced a data breach;<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Trusted:<\/b><span style=\"font-weight: 400;\"> If The app is not malware or has never experienced a data breach.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">\u201cEventbot would absolutely trigger a security alert,\u201d Simoni notes.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-20660\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2020\/05\/safe-app-installer-1024x898.jpg\" alt=\"\" width=\"474\" height=\"416\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2020\/05\/safe-app-installer-1024x898.jpg 1024w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2020\/05\/safe-app-installer-300x263.jpg 300w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2020\/05\/safe-app-installer-768x674.jpg 768w\" sizes=\"auto, (max-width: 474px) 100vw, 474px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">The free version of dfndr security also has an <strong><a href=\"psafe:\/\/launch\/safe_navigation\">anti-hacking capability<\/a> <\/strong>that blocks scams directly on the SMS app, web browsers and messaging apps (WhatsApp and Facebook Messenger). It also offers a URL checker to check the security of any URL you enter.<\/span><\/p>\n<h3><b>Further Safety Measures for EventBot (and Similar Trojans)<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">One of the easiest ways to protect yourself is to make sure that you are only downloading mobile apps from authorized sources,\u201d Simoni emphasizes. \u201cWith malwares as dangerous as Eventbot making the rounds, you have to be doubly alert and careful with any unofficial links.\u201d As a rule, you\u2019ll want to avoid any links sent by people unknown to you, and from bulk marketing SMSs and Emails. Finally, be careful with permissions required by various apps \u2014 if the list is extremely long or doesn\u2019t make sense, be on guard.<\/span><\/p>\n<h3><b>Consider dfndr Pro<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">One of the best ways to protect your information now is to upgrade your dfndr security app (if you haven\u2019t already) to PRO.\u00a0 <strong><a href=\"psafe:\/\/launch\/subscription_plans\">(This link will help you learn more, and you can use it to download PRO if you decide it\u2019s right for you.).<\/a><\/strong><\/span><\/p>\n<p><a href=\"psafe:\/\/launch\/direct_purchase?sku=com.psafe.msuite.pro_12mo_29.88\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-20383 size-medium aligncenter\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2019\/07\/GETADSFREEPLAN-300x56.png\" alt=\"\" width=\"300\" height=\"56\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2019\/07\/GETADSFREEPLAN-300x56.png 300w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2019\/07\/GETADSFREEPLAN.png 354w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">With <a href=\"psafe:\/\/launch\/subscription_plans\">dfndr Pro<\/a> in your toolbox, the rest is a matter of staying as aware as you can to protect yourself and your family. PSafe will continue to provide updates here for new malwares that we discover that is especially noteworthy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This one is VERY dangerous, so be careful out there!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A pernicious new malware that steals Android mobile banking data has been discovered, and it\u2019s targeting Android users throughout Europe and the United States.\u00a0<\/p>\n","protected":false},"author":83,"featured_media":20653,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[4451],"tags":[30,1362,182],"class_list":["post-20650","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-dfndr-company-news","tag-android","tag-cybersecurity","tag-malware"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/20650","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=20650"}],"version-history":[{"count":9,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/20650\/revisions"}],"predecessor-version":[{"id":20662,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/20650\/revisions\/20662"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media\/20653"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=20650"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=20650"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=20650"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}