Asacub Android Trojan: From Information Stealing to Financial Fraud
Kaspersky Lab’s Anti-Malware Research team has discovered Asacub – a new malware that targets Android users for financial gain.
When first identified, Asacub displayed all the signs of an information stealing malware; however some versions of the Trojan are targeting users of online banking in Russia, Ukraine and the US.
With millions of people worldwide using their smartphones to pay for goods and services, 2015 saw cybercriminals exploit this by focusing their efforts on developing malicious financial programs for mobile devices.
For the first time, a mobile banking Trojan entered the Top-10 most prevalent malicious programs targeting finances. The Asacub Trojan is yet another example of this worrying trend.
The first version of the Asacub Trojan, discovered in June 2015, was capable of stealing the contact lists, browser history, list of installed apps, sending SMS messages to given numbers and also blocking the screen of an infected device – all standard functions for a typical information stealing Trojan.
However, in autumn 2015 Kaspersky Lab’s experts discovered several new versions of the Asacub Trojan which confirmed its transformation into a tool for stealing money, with the new version equipped with phishing pages mimicking log-in pages of banking applications.
At first it looked like Asacub was targeting only Russian-speaking users, because the modifications contained fake log-in pages of Russian and Ukrainian banks. But after further investigation, Kaspersky Lab’s experts found a modification with fake pages of a large US bank.
These new versions also contained a new set of functions including call redirection and sending USSD requests (a special service for interactive non-voice and non-SMS communications between the user and cellular provider), which made Asacub a very powerful tool for financial fraud.
Although Kaspersky Lab has been aware of several different versions of the Trojan for some time, the company’s threat detection systems found almost no sign of active Asacub campaigns until the end of 2015.
Within just one week, Kaspersky Lab identified more than 6,500 attempts to infect users with the malware making it one of the 5 most popular mobile Trojans of that week, and the most popular Trojan-Banker.
“When analyzing this Trojan, we found that the Asacub malware has connections to criminals with links to a Windows-based spyware called CoreBot. The domain used by Asacub’s Command&Control center is registered to the same person as tens of domains that were used by Corebot. It is therefore highly likely that these two types of malware are being developed or used by the same gang, who see huge value and criminal gain in exploiting mobile banking users,” warns Roman Unuchek Senior Malware Analyst at Kaspersky Lab USA.
“Based on current trends, we can assume that in 2016, the development and prevalence of mobile banking malware will continue to grow and account for an even greater share of malware attacks. Users need to be extra vigilant to ensure they don’t become the next victim”, he added.
To help users keep their finances secure and defend against the latest malware threats, Kaspersky Lab products successfully detect and block the Asacub malware.
To learn more about this and other malicious programs, visit Securelist.com.
Liked this post? Follow SwirlingOverCoffee on Facebook.
About Kaspersky Lab
Kaspersky Lab is a global cybersecurity company founded in 1997. Kaspersky Lab’s deep threat intelligence and security expertise is constantly transforming into security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company’s comprehensive security portfolio includes leading endpoint protection and a number of specialized security solutions and services to fight sophisticated and evolving digital threats. Over 400 million users are protected by Kaspersky Lab technologies and we help 270,000 corporate clients protect what matters most to them.
Learn more at www.kaspersky.com.