Close Menu
  • Home
  • Android
  • Android Operating
  • Apple
  • Apps
  • Gadgets
  • Galaxy
  • Ipad
  • IPhone
  • Smartphone
  • Tablet

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Muse Dash, Hyperforma, Tower of Fortune 4, etc.

March 28, 2025

Best Kitchen Gadgets of 2025

March 18, 2025

The best drawing tablets of 2025: Expert tested and recommended

February 13, 2025
Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram
Wtf AndroidWtf Android
  • Home
  • Android
  • Android Operating
  • Apple
  • Apps
  • Gadgets
  • Galaxy
  • Ipad
  • IPhone
  • Smartphone
  • Tablet
Wtf AndroidWtf Android
Home » TrickMo malware uses fake lock screen to steal Android PIN
Android

TrickMo malware uses fake lock screen to steal Android PIN

adminBy adminOctober 14, 2024No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email


android

40 new variants of the TrickMo Android banking Trojan have been observed in the wild, linked to 16 droppers and 22 separate command-and-control (C2) infrastructures designed to steal Android PINs. Comes with new features.

This follows an earlier report by Clafy that looked at some, but not all, variants currently in circulation, reported by Zimperium.

TrickMo was first documented by IBM X-Force in 2020, but is believed to have been used to attack Android users since at least September 2019.

Fake lock screen steals Android PIN

Key features of the new TrickMo version include one-time password (OTP) interception, screen recording, data exfiltration, remote control, and more.

The malware attempts to exploit strong accessibility services permissions to grant itself additional privileges and automatically tap on prompts when needed.

As a banking Trojan, it provides users with an overlay of phishing login screens from various banks and financial institutions to steal the user’s account credentials and allow the attacker to perform fraudulent transactions.

Banking overlay used in attack
Banking overlay used in attack
Source: Zimperium

Zimperium analysts analyzing these new variants have also reported new deceptive unlock screens that mimic real Android unlock prompts and are designed to steal users’ unlock patterns or PINs. Masu.

“The deceptive user interface is an HTML page hosted on an external website that appears in full-screen mode on the device and appears to be a legitimate screen,” Zimperium explains.

“When the user enters an unlock pattern or PIN, the page sends the retrieved PIN or pattern details along with the unique device identifier (Android ID) to the PHP script.”

Fake Android lock screen displayed by TrickMo
Fake Android lock screen displayed by TrickMo
Source: Zimperium

Stealing the PIN allows an attacker to unlock the device and perform fraud on the device during times when it is not actively being monitored (perhaps late at night).

exposed victim

Because the C2 infrastructure was inadequately secured, Zimperium was able to confirm that at least 13,000 victims were affected by the malware. Most of the victims are in Canada, with significant numbers also found in the United Arab Emirates, Türkiye, and Germany.

Victim heat map
TrickMo Victim Heatmap
Source: Zimperium

According to Zimperium, this number equates to “several C2 servers,” so the total number of TrickMo victims could be even higher.

“Our analysis revealed that the IP list file is regularly updated each time the malware successfully compromises credentials,” Zimperium explains.

“We discovered millions of records within these files, representing a large number of compromised devices and a large amount of sensitive data accessed by threat actors.”

Clafy had previously withheld evidence of the breach from the public due to a misconfigured C2 infrastructure that could have exposed victims’ data to the broader cybercriminal community. Zimperium has chosen to post everything to this GitHub repository.

However, TrickMo’s target scope appears to be broad enough to encompass app types (and accounts) beyond banking, including VPNs, streaming platforms, e-commerce platforms, trading, social media, recruiting, and enterprise platforms.

While Clafy had previously withheld evidence of a breach from the public due to a misconfigured C2 infrastructure that could expose victims’ data to the broader cybercriminal community, Zimperium I have chosen to post it to this GitHub repository.

TrickMo is currently being spread through phishing, so to minimize the chance of infection, avoid downloading APKs from URLs sent via SMS or Direct Message from people you don’t know.

Google Play Protect identifies and blocks known variants of TrickMo, so ensuring TrickMo is active on your device is key to protecting against malware.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

Samsung returns to S25 Ultra s Pen Bluetooth Tease

January 27, 2025

My experience using Raspberry Pi for wireless Android Auto

October 31, 2024

This Android malware can transfer your phone to hackers

October 31, 2024
Add A Comment
Leave A Reply Cancel Reply

Editors Picks

Will Google’s new anti-theft feature be a game-changer for Android users?

October 13, 2024

Huawei’s Android replacement HarmonyOS Next launches next week, permanently discontinuing Google’s operating system on existing devices

October 11, 2024

Android 15 lets you turn your phone into a useful smart home dashboard – here’s how

October 11, 2024

Google ordered to open Android app store to competition

October 10, 2024
Top Reviews
Wtf Android
Facebook X (Twitter) Instagram Pinterest Vimeo YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 wtfandroid. Designed by wtfandroid.

Type above and press Enter to search. Press Esc to cancel.