A banking Trojan malware has been detected in Indian cyberspace attacks bank customers using Android phones and has already targeted those from more than 27 public and private sector banks, the country’s federal cyber security agency said in a latest advisory.
The phishing (a social engineering computer virus attack to steal personal data) malware is masquerading as an “income tax refund” and it can “effectively jeopardise the privacy of sensitive customer data and result in large-scale attacks and financial frauds”, the CERT-In advisory issued on Tuesday said.
“It has been observed that Indian banking customers are being targeted by a new type of mobile banking campaign using Drinik android malware,” it said.
“Drinik started as a primitive SMS stealer back in year 2016 and has evolved recently to a banking Trojan that demonstrates phishing screen and persuades users to enter sensitive banking information,” it said.
CERT-In
Customers of more than 27 Indian banks including major public and private sector banks have already been targeted by the attackers using this malware, the CERT-In said.
The Indian Computer Emergency Response Team or CERT-In is the federal technology arm to combat cyber attacks and guarding the cyber space against phishing and hacking assaults and similar online attacks.
Attack process
The victim, it said, receives an SMS containing a link to a phishing website (similar to the website of the Income Tax Department) where they are asked to enter personal information and download and install the malicious APK file in order to complete verification.
“This malicious android app masquerades as the Income Tax Department app and after installation, the app asks the user to grant necessary permissions like SMS, call logs, contacts etc. If the user does not enter any information on the website, the same screen with the form is displayed in the android application and the user is asked to fill in to proceed,” it said.
This data to be filled includes full name, PAN, Aadhaar number, address, date of birth, mobile number, email address and financial details like account number, IFS code, CIF number, debit card number, expiry date, CVV and PIN, it adds.
Also see: Chinese hackers target UIDAI, Times Group, report says
Once these details are entered by the user, it said, the application states that there is a refund amount that could be transferred to the user’s bank account.
When the user enters the amount and clicks “Transfer”, the application shows an error and demonstrates a fake update screen.
“While the screen for installing update is shown, Trojan in the back-end sends the user’s details including SMS and call logs to the attacker’s machine,” it said.
“These details are then used by the attacker to generate the bank specific mobile banking screen and render it on user’s machine. The user is then requested to enter the mobile banking credentials which are captured by the attacker,” it said.
Counter-measures
The advisory recommends some counter-measures to guard against such attacks and malware, like to always download apps from official app stores, install appropriate Android updates and patches as and when available, use safe browsing tools, do extensive research before clicking on link provided in the message and look out for valid encryption certificates by checking for the green lock in the browser’s address bar before sharing sensitive personal data.
It also asked users to immediately report any unusual activity in their account to their bank and also send a complaint to CERT-In.