Ajina.Banker: New Android Malware Targeting Central Asian Bank Customers and Bypassing 2FA via Telegram

A new strain of Android malware, codenamed Ajina.Banker, has been targeting bank customers across the Central Asia region since November 2023. Discovered by Group-IB, Ajina.Banker is specifically designed to steal financial data and intercept two-factor authentication (2FA) messages, giving attackers full access to victims’ banking accounts.
- Propagation via Telegram: Ajina.Banker is spread through a network of Telegram channels posing as legitimate apps related to banking, payment systems, government services, and everyday utilities. Threat actors use localized messages and promotions to make the malware more appealing and trustworthy to potential victims.
- Countries Affected: Targets include users in Armenia, Azerbaijan, Iceland, Kazakhstan, Kyrgyzstan, Pakistan, Russia, Tajikistan, Ukraine, and Uzbekistan. This regional targeting strategy exploits local trust in community channels and chats on Telegram.
- Automated Distribution: Evidence suggests that some aspects of Ajina.Banker’s distribution process may be automated, allowing it to evade Telegram’s moderation tools. Malicious APK files are shared in these channels, tricking users into downloading malware.
- Stealing Financial Data: Once installed, Ajina.Banker requests permission to access SMS messages, cellular network information, and SIM card details, allowing it to steal financial information. The malware also gathers data from installed financial apps and sends it to a remote command-and-control (C2) server.
- Phishing Pages and Accessibility Abuse: Newer versions of the malware deliver phishing pages to collect sensitive banking credentials. Additionally, Ajina.Banker abuses Android’s accessibility services API to prevent uninstallation and gain elevated permissions, making it difficult for victims to remove the threat.
- Bypassing 2FA: By intercepting SMS messages, Ajina.Banker can bypass two-factor authentication (2FA), a common security measure used to protect online banking accounts.
- Development in Progress: Ajina.Banker appears to be actively under development, as researchers have identified that the attackers are hiring Java coders and building tools to automate the malware’s spread and management.
To safeguard against Ajina.Banker and similar threats, Net Protector Cyber Security recommends the following steps:
- Install NPAV Mobile Security to protect Android devices from malware threats and phishing attacks.
- Avoid downloading apps from unofficial sources like Telegram or untrusted websites. Stick to Google Play Store.
- Enable Google Play Protect to automatically scan your device for harmful apps.
- Use a strong multi-factor authentication method that doesn’t rely solely on SMS-based 2FA.
Net Protector Cyber Security continues to monitor the evolving threat landscape to ensure our customers are protected from advanced mobile threats like Ajina.Banker.
Comment(s)
Categories
- Other (43)
- Ransomware (154)
- Events and News (27)
- Features (45)
- Security (487)
- Tips (79)
- Google (30)
- Achievements (11)
- Products (36)
- Activation (7)
- Dealers (1)
- Bank Phishing (53)
- Malware Alerts (235)
- Cyber Attack (303)
- Data Backup (13)
- Data Breach (132)
- Phishing (165)
- Securty Tips (2)
- Browser Hijack (19)
- Adware (15)
- Email And Password (71)
- Android Security (78)
- Knoweldgebase (38)
- Botnet (17)
- Updates (4)
- Alert (71)
- Hacking (71)
- Social Media (8)
- vulnerability (76)
- Hacker (38)
- Spyware (12)
- Windows (8)
- Microsoft (26)
- Uber (1)
- YouTube (1)
- Trojan (5)
- Website hacks (10)
- Paytm (1)
- Credit card scam (2)
- Telegram (3)
- RAT (8)
- Bug (3)
- Twitter (2)
- Facebook (8)
- Banking Trojan (10)
- Mozilla (2)
- COVID-19 (5)
- Instagram (4)
- NPAV Announcement (9)
- IoT Security (2)
- Deals and Offers (2)
- Cloud Security (12)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (3)
- WhatsApp (6)
- Amazon (2)
- DMart (1)
- Payment Risk (5)
- Occasion (3)
- firewall (3)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (52)
- Impersonation phishing (1)
- DDoS (7)
- Smishing (2)
- Whale (0)
- Whale phishing (4)
- WINRAR (2)
- ZIP (2)
- Fraud Protector (41)
Recent Posts
Archive
Tags
cybersecurity
cybercrime
cyber attack
phishing
phishing attacks
data breach
cybersecurity threats
cyber threats
phishing attack
data theft
malware
cyber fraud
android malware
credential theft
ransomware
financial fraud
ransomeware
social engineering
#cybersecurity
financial security
data protection
cyber security
phishingattack
cyberthreats
network security
ransomware attacks
malware distribution
data security
online fraud
cyber threat
data stealing
security vulnerabilities
ddos attack
cert-in
phishing scam
cyber crime
identity theft
phishing email
ransomware attack
microsoft
cybercriminals
digital safety
cyberattack
india
malware attack
twitter
ddos
trojan
critical vulnerability
cyber attacks