The infamous Anubis banking trojan has evolved to target Android mobile users. Lately, two related servers containing 17,490 samples of Anubis trojans have been detected by security researchers. These samples of Anubis are called AndroidOS_AnubisDropper.
What are the trojan capabilities?
Researchers at Trend Micro used SHA-256 to analyze the new samples of Anubis and found that these variants requested the following URLs to download a malicious app:
These URLs retrieved the following malicious APKs:
Furthermore, these new variants of Anubis trojan are labeled as either ‘Operatör Güncellemesi’ or ‘Google Services.’
Worth noting
According to Trend Micro researchers, “These labels are probably social engineering lures used to trick unwitting users into downloading an Anubis-embedded app.”
The samples that are marked with ‘Operatör Güncellemesi’ label come with information-stealing capabilities as the previous iterations. These information-stealing capabilities include:
Apart from stealing information, these variants Anubis also target a list of 188 financial and banking-related apps from which it steals personal and financial data. Many of these apps are based in Poland, Australia, Turkey, Germany, France, Italy, Spain, USA, and India.
The samples of Anubis trojan that are marked with the Google Services label include both information-stealing and environment-detection capabilities.
Publisher