Heimdal Security Blog

SharkBot Android Trojan Steals Banking and Crypto Accounts

A new malware has made its way onto the threat landscape. Security experts have revealed the emergence of the SharkBot Android trojan. It apparently targets crypto and banking services from the U.S., the U.K., and Italy. It works by exploiting devices accessibility features having the goal of credentials theft.

Characteristics of SharkBot Android Trojan

According to a report from the Cleafy researchers, who also gave the banking trojan this particular name “SharkBot”, there were identified 22 targets of the malware among which there were international UK and Italy banks, as well as 5 other crypto services. These experts discovered the malware at the end of October 2021. Its very name seems to be related to the strings the researchers under discussion found in its binaries, as the discovered strings had the word “sharked” within.

Following the report information, SharkBot Android trojan has the following characteristics:

Here is an example of how this SharkBot Android trojan performs an ATS attack:

Image Source

The main goal of SharkBot is to initiate money transfers from the compromised devices via Automatic Transfer Systems (ATS) technique bypassing multi-factor authentication mechanisms (e.g., SCA),” the researchers said in a report. (…) Once SharkBot is successfully installed in the victim’s device, attackers can obtain sensitive banking information through the abuse of Accessibility Services, such as credentials, personal information, current balance, etc., but also to perform gestures on the infected device.

Source

 

However, malware samples could not be found in Google Play, this meaning the SharkBot Android trojan deployment on the compromised devices is done in a different way. Maybe through social engineering techniques or sideloading schemes.

Did you enjoy this article? Follow us on LinkedInTwitterFacebookYoutube, or Instagram to keep up to date with everything we post!