Ajina.Banker: New Android Malware Targeting Central Asian Bank Customers and Bypassing 2FA via Telegram
A new strain of Android malware, codenamed Ajina.Banker, has been targeting bank customers across the Central Asia region since November 2023. Discovered by Group-IB, Ajina.Banker is specifically designed to steal financial data and intercept two-factor authentication (2FA) messages, giving attackers full access to victims’ banking accounts.
- Propagation via Telegram: Ajina.Banker is spread through a network of Telegram channels posing as legitimate apps related to banking, payment systems, government services, and everyday utilities. Threat actors use localized messages and promotions to make the malware more appealing and trustworthy to potential victims.
- Countries Affected: Targets include users in Armenia, Azerbaijan, Iceland, Kazakhstan, Kyrgyzstan, Pakistan, Russia, Tajikistan, Ukraine, and Uzbekistan. This regional targeting strategy exploits local trust in community channels and chats on Telegram.
- Automated Distribution: Evidence suggests that some aspects of Ajina.Banker’s distribution process may be automated, allowing it to evade Telegram’s moderation tools. Malicious APK files are shared in these channels, tricking users into downloading malware.
- Stealing Financial Data: Once installed, Ajina.Banker requests permission to access SMS messages, cellular network information, and SIM card details, allowing it to steal financial information. The malware also gathers data from installed financial apps and sends it to a remote command-and-control (C2) server.
- Phishing Pages and Accessibility Abuse: Newer versions of the malware deliver phishing pages to collect sensitive banking credentials. Additionally, Ajina.Banker abuses Android’s accessibility services API to prevent uninstallation and gain elevated permissions, making it difficult for victims to remove the threat.
- Bypassing 2FA: By intercepting SMS messages, Ajina.Banker can bypass two-factor authentication (2FA), a common security measure used to protect online banking accounts.
- Development in Progress: Ajina.Banker appears to be actively under development, as researchers have identified that the attackers are hiring Java coders and building tools to automate the malware’s spread and management.
To safeguard against Ajina.Banker and similar threats, Net Protector Cyber Security recommends the following steps:
- Install NPAV Mobile Security to protect Android devices from malware threats and phishing attacks.
- Avoid downloading apps from unofficial sources like Telegram or untrusted websites. Stick to Google Play Store.
- Enable Google Play Protect to automatically scan your device for harmful apps.
- Use a strong multi-factor authentication method that doesn’t rely solely on SMS-based 2FA.
Net Protector Cyber Security continues to monitor the evolving threat landscape to ensure our customers are protected from advanced mobile threats like Ajina.Banker.
Comment(s)
Categories
- Other (42)
- Ransomware (116)
- Events and News (25)
- Features (44)
- Security (413)
- Tips (79)
- Google (22)
- Achievements (7)
- Products (31)
- Activation (7)
- Dealers (1)
- Bank Phishing (42)
- Malware Alerts (174)
- Cyber Attack (215)
- Data Backup (11)
- Data Breach (74)
- Phishing (130)
- Securty Tips (1)
- Browser Hijack (16)
- Adware (15)
- Email And Password (67)
- Android Security (53)
- Knoweldgebase (37)
- Botnet (15)
- Updates (3)
- Alert (70)
- Hacking (56)
- Social Media (7)
- vulnerability (50)
- Hacker (31)
- Spyware (8)
- Windows (5)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (3)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (4)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (4)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (5)
- IoT Security (1)
- Deals and Offers (1)
- Cloud Security (7)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (1)
- DMart (1)
- Payment Risk (4)
- Occasion (2)
- firewall (1)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (4)
- Impersonation phishing (1)
- DDoS (4)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (1)
Recent Posts
Archive
Tags
cyber attack
phishing
data breach
ransomware
ransomeware
android malware
cyber security
data stealing
ddos
twitter
india
phishing email
microsoft
cert-in
cybercrime
malware
pune
vulnerability
cyber crime
independence day
occasion
hacking
financial security
telegram
phishing scam
android apps
financial fraud
cyber attack in india
data security
scam
clop gang
pakistani hackers
clop gang extorting
google play store
play store
fedex
user data leak
microsoft team
android
pakistan-backed hacker
whatsapp
clop
malicious apps
email phishing
december cyber attacks
lockbit
cert
cryptojacking
ddos attack
winrar