Heimdal Security Blog

New Version of the Vultur Android Banking Trojan Spoofs Security App

vultur android banking trojan

Researchers discovered new version of the Vultur Android banking trojan upgraded its obfuscation and remote control features.

Reportedly, the malware masquerades the McAfee Security app to trick the victim into installing it.

The Vultur banking trojan infection chain explained

The first step of the attack is sending the victim a phishing SMS warning about an authorized transaction. The hackers pressure the target to call a given number for help.

Next, the threat actors get the victim to click a malicious link in another SMS.

The victim lands on a fake McAfee Security app download page. Downloading the forged security app leads to installing the “Brunhilda” malware dropper.

The dropper runs three Vultur payloads (APKs and a DEX file). From then on, the malware can

Source: Fox-IT 

What are Vultur’s new technical features?

Researchers say the Android banking trojan uses AES and Base64 encryption to stealthily communicate with its C2. Besides, the new Vultur malware can:

How to prevent a Vultur malware infection

Avoid falling victim to the new Vultur banking trojan by following a few cybersecurity best practices:

If you liked this article, follow us on LinkedIn, Twitter, Facebook, and Youtube, for more cybersecurity news and topics.