Jump to content

Recommended Posts

  • ExTS Admin
Posted

http://img.photobucket.com/albums/v708/starbuck50/asacub-evolves-from-simple-spyware-to-a-full-on-android-banking-trojan-499165-2_zpsedmzdvxn.jpg

 

Over the past six months, security experts from Kaspersky have observed the slow evolution of the Asacub malware from simple spyware that sniffed info about the device into a full-blown cyber-threat capable of collecting banking information, opening a backdoor on infected phones, and installing ransomware.

 

First detected in June 2015 as Trojan-Banker.AndroidOS.Asacub, the malware was a simple app that infected Android devices and collected data, sending it to a C&C (command and control) server.

 

The first version of Asacub gathered information such as the list of apps a user has installed on their mobile device, their browser's history, and their contact list. Optionally, the malware could also send SMS messages and turn off the user's screen on command. That was it.

 

Asacub slowly evolved during the summer

 

Things quickly developed, and in July, only after a month, Kaspersky researchers saw the first Asacub evolution, with its authors adding the option to steal SMS messages and intercept and delete SMS texts, a feature needed for whenever the trojan was used to validate and then hide fraudulent transactions.

 

With each passing month, Asacub added more and more new features, like the capability to mute phones, turn off the screen but leave the CPU running, and even a remote shell that gave attackers access to the phone's console, a classic backdoor.

 

The biggest and most important upgrade was in September, when Asacub was updated to show phishing screens for various banking apps (Russia, Ukraine, the US). Additionally, the malware was also updated to forward calls if needed, make USSD requests, and even download and install other apps from the Web (useful when installing ransomware).

 

Asacub was only recently deployed against Android users

 

Despite all these features, Asacub activity remained low, with an infection here and there. Things changed on December 28, 2015, when Ascaub infections sky-rocketed and continued to remain at high numbers ever since.

 

Right now, only the mobile banking features are used, even if the malware is capable of other more intrusive operations.

 

"Asacub is an all-in-one hacker asset," the Kaspersky team noted. "It could be used for phishing, malware distribution or even blackmailing. As it looks now, the adversaries are just testing out the available toolset, and there are reasons we should anticipate massive campaigns."

 

http://img.photobucket.com/albums/v708/starbuck50/asacub-evolves-from-simple-spyware-to-a-full-on-android-banking-trojan-499165-4_zps31madyb3.png

 

 

 

Source:

http://news.softpedia.com/news/asacub-evolves-from-simple-spyware-to-a-full-on-android-banking-trojan-499165.shtml

Member of:

UNITE

  • Replies 0
  • Created
  • Last Reply

Top Posters In This Topic

Popular Days

Top Posters In This Topic

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...