
The Android banking trojan referred to as Vultur has resurfaced with a set of recent options and improved anti-analysis and detection evasion methods, enabling its operators to remotely work together with a cellular gadget and harvest delicate information.
“Vultur has additionally began masquerading extra of its malicious exercise by encrypting its C2 communication, utilizing a number of encrypted payloads which can be decrypted on the fly, and utilizing the guise of reputable purposes to hold out its malicious actions,” NCC Group researcher Joshua Kamp mentioned in a report revealed final week.
Vultur was first disclosed in early 2021, with the malware able to leveraging Android’s accessibility providers APIs to execute its malicious actions.
The malware has been noticed to be distributed through trojanized dropper apps on the Google Play Retailer, masquerading as authenticator and productiveness apps to trick unwitting customers into putting in them. These dropper apps are supplied as a part of a dropper-as-a-service (DaaS) operation known as Brunhilda.
Different assault chains, as noticed by NCC Group, contain the droppers being unfold utilizing a mixture of SMS messages and telephone calls – a way known as telephone-oriented assault supply (TOAD) – to in the end serve an up to date model of the malware.
“The primary SMS message guides the sufferer to a telephone name,” Kamp mentioned. When the sufferer calls the quantity, the fraudster offers the sufferer with a second SMS that features the hyperlink to the dropper: a modified model of the [legitimate] McAfee Safety app.”
The preliminary SMS message goals to induce a false sense of urgency by instructing the recipients to name a quantity to authorize a non-existent transaction that includes a big sum of cash.
Upon set up, the malicious dropper executes three associated payloads (two APKs and one DEX file) that register the bot with the C2 server, get hold of accessibility providers permissions for distant entry through AlphaVNC and ngrok, and run instructions fetched from the C2 server.
One of many distinguished additions to Vultur is the power to remotely work together with the contaminated gadget, together with finishing up clicks, scrolls, and swipes, via Android’s accessibility providers, in addition to obtain, add, delete, set up, and discover information.
As well as, the malware is provided to stop the victims from interacting with a predefined record of apps, show customized notifications within the standing bar, and even disable Keyguard to bypass lock display screen safety measures.

“Vultur’s latest developments have proven a shift in focus in direction of maximizing distant management over contaminated gadgets,” Kamp mentioned.
“With the potential to problem instructions for scrolling, swipe gestures, clicks, quantity management, blocking apps from working, and even incorporating file supervisor performance, it’s clear that the first goal is to realize complete management over compromised gadgets.”
The event comes as Group Cymru revealed the Octo (aka Coper) Android banking trojan’s transition to a malware-as-a-service operation, providing its providers to different menace actors for conducting info theft.
“The malware presents quite a lot of superior options, together with keylogging, interception of SMS messages and push notifications, and management over the gadget’s display screen,” the corporate mentioned.
“It employs varied injects to steal delicate info, comparable to passwords and login credentials, by displaying faux screens or overlays. Moreover, it makes use of VNC (Digital Community Computing) for distant entry to gadgets, enhancing its surveillance capabilities.”
Octo campaigns are estimated to have compromised 45,000 gadgets, primarily spanning Portugal, Spain, Turkey, and the U.S. Among the different victims are positioned in France, the Netherlands, Canada, India, and Japan.
The findings additionally observe the emergence of a brand new marketing campaign focusing on Android customers in India that distributes malicious APK packages posing as on-line reserving, billing, and courier providers through a malware-as-a-service (MaaS) providing.
The malware “targets theft of banking info, SMS messages, and different confidential info from victims’ gadgets,” Broadcom-owned Symantec mentioned in a bulletin.