Logo
  • home
  • cryptocurrencies
  • bitcoin
  • ethereum
  • dogecoin
  • domains
  • contact

Oscorp – New Android Credential Stealing Malware Actively Attack in the Wild

Recently, security researchers have found an android malware, and it has been dubbed as Vulture that is a Remote Access Trojan (RAT). According to the report, this malware is violating accessibility services on the targeted devices, so that the attackers can hijack user credentials for European banking.

However, this malware is quite dangerous, as it uses Virtual Network Computing (VNC) remote screen access technology to keep a continuous check on the users. 

After discovering the malware attack, it also came out that this malware was disseminated by the official of Google Play Store and misrepresented itself as the Protection Guard application that contained nearly 5,000 installations.

This is not the first time to encounter such malware, as Italy’s CERT-AGID, has disclosed some of the details regarding Oscorp in January. This malware has features that include the capability to block SMS messages and make phone calls.

Not only this but it also intensifies overlay attacks for more than 150 mobile applications and it is done by practicing comparable login screens that distract the valuable data.

Oscorp Evolves Into UBEL

The new Oscorp malware comes up with some new but minor changes, but experts noted that simultaneously a new Android botnet names UBEL was being promoted on several hacking forums.

After detecting the malware, the experts noted that several UBEL clients have commenced accusing the malware of scamming because the clients affirmed that it is not working on specific Android devices.

Apart from this, there is proof that justifies that Oscorp evolves into UBEL, that is the “bot id” string format, which consists of an initial “RZ-” substring which is followed by casual alphanumeric characters.

Static Analysis

However, in the static analysis, the experts have noted that it included the most interesting permissions that are requested by Oscorp for getting access to limited parts of the Android system such as READ_SMS, SEND_SMS and it also provides other legitimate applications that are BIND_ACCESSIBILITY_SERVICE).

  • SYSTEM_ALERT_WINDOW: This allows an app to produce windows that are displayed on top of all other apps. 
  • RECORD_AUDIO: This allows an app to record audio‍
  • READ_SMS: This allows an app to convey SMS messages‍
  • SEND_SMS: This allows an app to convey SMS messages‍
  • RECEIVE_SMS: This allows an app to accept SMS messages‍
  • REQUEST_INSTALL_PACKAGES: It allows an application to inquire about installing packages‍
  • REQUEST_DELETE_PACKAGES: It allows an application to request eliminating packages   ‍
  • RECEIVE_BOOT_COMPLETED: This allows an app to launch itself automatically after system boot.

Dynamic Analysis

According to the report, whenever the malicious application gets downloaded on the device, it attempts to be installed as an “Android Service”, which works as an application element that can easily implement long-running operations in the background.

Once the installation of “Android Service” is done Oscorp generally request some mandatory permissions, and that’s why we have mentioned them below:- 

  • Inspect your actions
  • Recover window content
  • Execute arbitrary gestures

Apart from all, the report claimed that this new malware has used the cross-platform ngrok service so that it can connect local servers that are generally guarded by Network Address Translation (NAT) as well as firewalls to the Internet.

The services were being protected via secure tunnels as it provides remote access to a VNC server that is originally running locally on the phone. 

However, the most interesting part is that the use of WebRTC to communicate with the negotiated Android phone, all this is done because it is quite necessary to enroll a new device.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

The post Oscorp – New Android Credential Stealing Malware Actively Attack in the Wild appeared first on Cyber Security News.


Go to source (full text)

July 31, 2021   Balaji N
cybersecuritynews.com Cyber Security News, malware

Related Posts

  • Someone Has Been Mailing USB Drives to Journalists That Are Programmed to Explode
    Someone Has Been Mailing USB Drives to Journalists That Are Programmed to Explode
  • ChatGPT Privacy Bug Exposes Chat Histories to Other Users
    ChatGPT Privacy Bug Exposes Chat Histories to Other Users
  • Hackers Attack Administrative Organizations Using PowerMagic and CommonMagic Malware
    Hackers Attack Administrative Organizations Using PowerMagic and CommonMagic Malware
×

  • Google Fi Purportedly Isn’t Letting Subscribers Call Poison Control for Some Weird Reason
  • Global Cryptocurrency Adoption Doubled Since January Reaching 221 Million Users: Report

Latest News

  • Airdrop claims help Arbitrum process twice Ethereum’s transaction in 24 hours
  • Federal Reserve Admits Blindsided Oversight of SVB Collapse
  • CFTC Receives DeFi Crash Course
  • Coinbase CEO Compares SEC to Soccer Refs in Criticism of Lack of Clarity Around Crypto Regulation
  • Independent Reserve Considers Expansion to Hong Kong
  • Scammers adapt to survive during crypto winter
  • Kraken Halts ACH Deposits and Withdrawals via Silvergate
  • Ethics of Web3 Discussed at Paris Blockchain Week
  • UAE’s Central Bank Nears Launch of Digital Dirham
  • Banking crisis could push cryptocurrency regulation into gray area
  • Dutch startup OneThird secures €2.75 million to address the global trillion dollar food waste problem
  • What Bard gets right that ChatGPT doesn’t
  • Pay only $250 for a refurbished MacBook Air
  • Save on powerful Intel Core CPUs at Newegg with PAX-inspired coupon codes
  • Block ads, beat trackers, and protect your family on 9 devices with this $27 app

Cryptocurrency Converter

Cryptodomains For Sale

cryptotrading.ooo

cryptotrade.ooo

cryptodatas.com

cryptos.capital

cryptos.events

cryptos.ventures

cryptos.wtf

ooo.capital

ooo.loans

ooo.tours

property.bet

cryptocoin.ooo

cryptocoins.ooo

assets.bet

cryptoexchange.ooo

cryptomania.world

cryptoinvest.ooo

cryptos.media

cryptos.foundation

cryptos.fm

cryptobank.today

ooo.credit

ooo.finance

ooo.domains

ooo.health

cryptos.trade

ooo.world

SEE MORE

Cryptocurrencies Price Live

Bitcoin Price Live

Ethereum Price Live

Dogecoin Price Live

Shiba Inu Price Live

XRP Price Live

Tether Price Live

Bitcoin Cash Price Live

Cardano Price Live

Bitcoin SV Price Live

Litecoin Price Live

Crypto.com Coin Price Live

Binance Coin Price Live

EOS Price Live

ChainLink Price Live

ChatGPT – the AI bot is free for now

A conversational AI system that listens, learns, and challenges:

https://chat.openai.com/

Buy Crypto Domains

Buy Crypto Domains
Find More > Go to Homepage
© 1010.team
Trusted news about IT, New Technologies, Internet Business, Startups, Cryptocurrency, Cybersecurity
bitcoin
Bitcoin (BTC) $ 28,194.55 1.34%
ethereum
Ethereum (ETH) $ 1,802.96 2.21%
tether
Tether (USDT) $ 1.01 0.30%
bnb
BNB (BNB) $ 324.56 0.82%
usd-coin
USD Coin (USDC) $ 1.00 0.12%
xrp
XRP (XRP) $ 0.430514 3.44%
cardano
Cardano (ADA) $ 0.363705 3.10%
staked-ether
Lido Staked Ether (STETH) $ 1,796.68 2.02%
dogecoin
Dogecoin (DOGE) $ 0.075746 0.06%
matic-network
Polygon (MATIC) $ 1.12 0.41%