Kaspersky lab : Acecard Trojan many-headed and extremely dangerous
Kaspersky Lab’s Anti-malware Research Team reported detection of “one of the most dangerous Android banking Trojans ever seen”, called Acecard. Let’s see what makes this malware so dangerous.
In a nutshell, the primary source of danger Acecard poses is its vast functionality. The Acecard Trojan family can do almost anything malware does today – from stealing a bank’s text and voice messages to overlaying official app windows with false messages that simulate the official login page in an attempt to steal personal information and account details.
The most recent version can attack custom applications of at least 30 banks and online payment services. Besides, it can overlay with phishing windows with such services as WhatsApp, Viber, Instagram, and Skype, along with Facebook, Twitter, Gmail, Google Play and Google Music, and PayPay mobile app.
#Acecard Trojan: many-headed and extremely dangerous. #security
Some major regional social networks, such as Russia’s Vkontakte and Odnoklassniki, are also in its reticle, which gives a tip to the origins of the Trojan.
Malware code was studied by Kaspersky lab experts, and they are inclined to think that Acecard was created by the same group of cybercriminals responsible for the first TOR Trojan for Android Backdoor.AndroidOS.Torec.a and the first mobile encryptor/ransomware Trojan-Ransom.AndroidOS.Pletor.a.
The evidence for this is based on similar code lines – names of methods and classes – and the use of the same Command and Controls servers. Acecard was produced by a powerful and experienced group of criminals, most likely Russian-speaking.
For the full article == Click Here ==