Ajina.Banker: New Android Malware Targeting Central Asian Bank Customers and Bypassing 2FA via Telegram
A new strain of Android malware, codenamed Ajina.Banker, has been targeting bank customers across the Central Asia region since November 2023. Discovered by Group-IB, Ajina.Banker is specifically designed to steal financial data and intercept two-factor authentication (2FA) messages, giving attackers full access to victims’ banking accounts.
- Propagation via Telegram: Ajina.Banker is spread through a network of Telegram channels posing as legitimate apps related to banking, payment systems, government services, and everyday utilities. Threat actors use localized messages and promotions to make the malware more appealing and trustworthy to potential victims.
- Countries Affected: Targets include users in Armenia, Azerbaijan, Iceland, Kazakhstan, Kyrgyzstan, Pakistan, Russia, Tajikistan, Ukraine, and Uzbekistan. This regional targeting strategy exploits local trust in community channels and chats on Telegram.
- Automated Distribution: Evidence suggests that some aspects of Ajina.Banker’s distribution process may be automated, allowing it to evade Telegram’s moderation tools. Malicious APK files are shared in these channels, tricking users into downloading malware.
- Stealing Financial Data: Once installed, Ajina.Banker requests permission to access SMS messages, cellular network information, and SIM card details, allowing it to steal financial information. The malware also gathers data from installed financial apps and sends it to a remote command-and-control (C2) server.
- Phishing Pages and Accessibility Abuse: Newer versions of the malware deliver phishing pages to collect sensitive banking credentials. Additionally, Ajina.Banker abuses Android’s accessibility services API to prevent uninstallation and gain elevated permissions, making it difficult for victims to remove the threat.
- Bypassing 2FA: By intercepting SMS messages, Ajina.Banker can bypass two-factor authentication (2FA), a common security measure used to protect online banking accounts.
- Development in Progress: Ajina.Banker appears to be actively under development, as researchers have identified that the attackers are hiring Java coders and building tools to automate the malware’s spread and management.
To safeguard against Ajina.Banker and similar threats, Net Protector Cyber Security recommends the following steps:
- Install NPAV Mobile Security to protect Android devices from malware threats and phishing attacks.
- Avoid downloading apps from unofficial sources like Telegram or untrusted websites. Stick to Google Play Store.
- Enable Google Play Protect to automatically scan your device for harmful apps.
- Use a strong multi-factor authentication method that doesn’t rely solely on SMS-based 2FA.
Net Protector Cyber Security continues to monitor the evolving threat landscape to ensure our customers are protected from advanced mobile threats like Ajina.Banker.
Comment(s)
Categories
- Other (42)
- Ransomware (128)
- Events and News (26)
- Features (45)
- Security (433)
- Tips (79)
- Google (22)
- Achievements (9)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (42)
- Malware Alerts (195)
- Cyber Attack (221)
- Data Backup (11)
- Data Breach (80)
- Phishing (139)
- Securty Tips (1)
- Browser Hijack (16)
- Adware (15)
- Email And Password (67)
- Android Security (56)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (7)
- vulnerability (54)
- Hacker (31)
- Spyware (8)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (3)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (5)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (5)
- IoT Security (1)
- Deals and Offers (1)
- Cloud Security (8)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (1)
- DMart (1)
- Payment Risk (4)
- Occasion (2)
- firewall (1)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (7)
- Impersonation phishing (1)
- DDoS (4)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)
Recent Posts
Archive
Tags
cyber attack
phishing
data breach
ransomware
ransomeware
android malware
financial security
cyber security
malware
phishing attack
cyber threats
data stealing
phishing attacks
cyber threat
lockbit
india
data theft
ddos
financial fraud
cybercrime
cert-in
twitter
network security
phishing email
microsoft
critical vulnerability
trojan
cryptojacking
scam
phishing scam
play store
clop
email security
email phishing
vulnerability
cyber fraud
net protector total security
server security
malicious apps
winrar
data security
microsoft team
android apps
pakistan-backed hacker
cyberattack
cybercriminals
data backup
cyber attacks
organisation
ddos attack