SELECT LANGUAGE BELOW

New Android malware BankBot YNRK aims at banking applications and cryptocurrency wallets

New Android malware BankBot YNRK aims at banking applications and cryptocurrency wallets

Over the past few years, Android users have faced a rising wave of financial malware. Threats such as Hydra, Anatsa, and Octo show how malicious actors can take control of devices, monitor screens, and hijack accounts without users realizing it. Although security updates have mitigated some of these risks, malware developers are constantly evolving their tactics.

The newest variant making the rounds is particularly sophisticated. Known as Android BankBot YNRK, this malware can silence your device, capture screenshots of banking applications, access clipboard information, and even automate transactions in cryptocurrency wallets. It stands out as one of the more advanced forms of mobile malware.

How malware infiltrates your device

BankBot YNRK hides within a counterfeit Android app that appears genuine. According to research from Cyfirma, the malware has been discovered disguised as an official digital identity application. Once the app is on a device, it begins gathering information like brand, model, and installed software. It even checks if the device is an emulator to avoid security detection, and is designed to adapt its behavior depending on the specific phone model.

In a clever move, the malware might disguise itself as a news app, such as Google News, altering its name and icon while loading the actual news site in the background. Victims, believing they are using a legitimate application, are unaware of the malware quietly operating behind the scenes.

One of its first actions is muting audio notifications. This means users won’t receive alerts for incoming messages or calls that might indicate suspicious activity. Following this, it seeks permission for accessibility services, allowing the malware to navigate the device similarly to how the user would. Once granted, it can press buttons, scroll, and read everything displayed on the device.

Furthermore, BankBot YNRK installs itself as a device administrator application. This complicates removal and enables the malware to restart itself automatically after a reboot. It also schedules regular background tasks to ensure it stays active as long as there’s an internet connection.

What does the malware manage to steal?

Once it receives commands from a remote server, the malware can nearly takeover the device. It transmits device details and a roster of installed applications to the attacker, including popular banking apps from regions like Vietnam, Malaysia, Indonesia, and India, as well as global cryptocurrency wallets.

With accessibility permissions granted, the malware can read everything on your screen and captures user interface metadata to reconstruct a simplified version of your app’s interface. This data enables it to enter login credentials, navigate menus, and verify transactions seamlessly. It can perform actions like setting text fields, installing or uninstalling apps, taking photos, sending SMS, and activating banking apps while the screen remains inactive.

In cryptocurrency wallets, the malware acts like an automated bot, directly performing tasks without needing passwords or PINs. It can access apps, read balance information, bypass biometric prompts, and execute transactions. Essentially, if it’s on your screen, the malware can use it.

It’s also capable of monitoring clipboard activity. If a user copies sensitive information like OTPs or account numbers, that data is quickly forwarded to the attackers. In addition, enabling call forwarding allows the malware to secretly redirect banking verification calls, all taking place mere moments after activation.

Steps to safeguard against banking malware

As banking Trojans become more sophisticated, there are practical habits that can significantly minimize the risks. Here’s a checklist to enhance your security:

1) Use robust antivirus software

Solid antivirus programs can help detect suspicious activities and address problems before they escalate. They analyze apps during installation and alert users about risky permissions, blocking known threats effectively. Leading antivirus solutions also check links and messages for potential risks, providing an essential layer of protection against fast-acting scams.

2) Reduce your digital footprint

Data brokers often collect and sell personal information, making it easier for scammers to perpetrate attacks. Utilizing a reliable data deletion service can help eliminate your information from multiple sites, decreasing the chances of being targeted by phishing and spam attacks.

3) Download apps solely from trusted locations

Avoid acquiring APKs from unreliable sites or forwarded messages. Most Android banking malware comes from apps that appear official but contain malicious code. While the Play Store has its flaws, it generally offers safer options than sideloaded apps.

4) Keep your devices and apps current

System updates often fix security vulnerabilities that hackers exploit. It’s equally important to keep apps updated, as older versions may have unpatched weaknesses. Enabling automatic updates can help maintain protection.

5) Employ a strong password manager

Password managers assist in generating long, unique passwords for different accounts, eliminating the need to enter them manually. Thus, reducing the potential for malware to capture sensitive data. Additionally, they can check for exposed emails from past breaches, allowing users to react promptly.

6) Activate two-factor authentication (2FA) where possible

2FA introduces an extra verification step, making it tougher for attackers to access accounts, even if login information is stolen. While it won’t prevent malware from affecting devices, it limits the potential damage.

7) Regularly review app permissions and installed apps

Malware can exploit permissions related to device management and accessibility. Regularly checking which apps have such privileges and removing those that seem suspicious can help catch malicious software early.

Key takeaways

BankBot YNRK represents a notable threat in the realm of Android banking malware. Its ability to profile devices, maintain persistent control, automate tasks, and harvest data poses a significant risk. To protect yourself, avoiding unofficial apps, analyzing installed software frequently, and being cautious about permissions are crucial steps.

Do you feel that Android smartphone companies like Samsung and Google are doing enough to safeguard users against malware? Share your thoughts.

Facebook
Twitter
LinkedIn
Reddit
Telegram
WhatsApp

Related News