BlackRock Trojan steals passwords and card data from 337 applications on Android OS

BlackRock Trojan on Android OS

Researchers from ThreatFabric have published a report on the study of a new Trojan on Android OS, called BlackRock. This malware is aimed stealing data from various applications, including dating applications, instant messengers, bank products, social networks and so on. En total, the trojan can attack 337 aplicaciones.

This threat was first noticed in May of this year, but its BlackRock roots go much further. The fact is that the trojan is based on the “leaked” source codes of another malware, Xerxes, cual, a su vez, was also based on the sources of other malware.

BlackRock Trojan on Android OS
BlackRock’s roots lie somewhere in LokiBot code

It is noted to the BlackRock were added new features, in particular designed to steal user passwords and bank card information.

En general, BlackRock works in the same way as most other Android bankers; it just targets more applications. Así que, the trojan steals user credentials, but if possible, prompts the victim to enter payment card information (if the target application supports financial transactions).

“Data collection and theft is done using overlays. Eso es, the malware detects when a user tries to interact with any legitimate application and displays its own fake on top of this window, where the victim enters his credentials or card details», – written by ThreatFabric specialists.

To be able to display such windows on top of other applications, the trojan uses an old trick and asks the user for access to the Accessibility Service. Having received these rights, the malware gives itself other necessary permissions on its own, and then completely gets administrator access on the device by using Android DPC.

ThreatFabric researchers write that most BlackRock overlays are designed to attack financial applications as well as social media. Sin embargo, there are overlays for other types of applications, including dating, noticias, shopping and so on. A full list of targeted applications can be found in the expert report.

BlackRock Trojan on Android OS

BlackRock Trojan on Android OS

In addition to imposing phishing overlays, the Trojan can perform other malicious operations:

  • intercept SMS messages;
  • use SMS flood;
  • spam all contacts with predefined SMS;
  • run specific applications;
  • intercept clicks (registrador de teclas);
  • show push notifications;
  • sabotage the operation of anti-virus applications.

BlackRock is currently spreading through scam sites that disguise itself as fake Google update packages. Until the Trojan was found in the official Google Play Store.

Let me remind you that I recently wrote about two new malware, that can steal cookies from Android apps.

Por Vladimir Krasnogolovy

Vladimir es un especialista técnico al que le encanta dar consejos y sugerencias cualificados sobre los productos de GridinSoft. Está disponible las 24 horas del día, los 7 días de la semana para ayudarte con cualquier pregunta relacionada con la seguridad en Internet.

Dejar un comentario

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *