
New Chameleon Android malware mimics financial institution, govt, and crypto apps
A brand new Android trojan referred to as ‘Chameleon’ has been concentrating on customers in Australia and Poland because the begin of the 12 months, mimicking the CoinSpot cryptocurrency trade, an Australian authorities company, and the IKO financial institution.
The cell malware was found by cybersecurity agency Cyble, which experiences seeing distribution by compromised web sites, Discord attachments, and Bitbucket internet hosting companies.
Chameleon contains a variety of malicious performance, together with stealing person credentials by overlay injections and keylogging, cookies, and SMS texts from the contaminated gadget.
A deal with evasion
Upon launch, the malware performs quite a lot of checks to evade detection by safety software program.
These checks embody anti-emulation checks to detect if the gadget is rooted and debugging is activated, growing the probability that the app is working in an analyst’s surroundings.
If the surroundings seems clear, the an infection continues, and Chameleon requests the sufferer to allow it to make use of the Accessibility Service, which it abuses to grant itself extra permissions, disable Google Play Shield, and cease the person from uninstalling it.

At first reference to the C2, Chameleon sends the gadget model, mannequin, root standing, nation, and exact location, most likely to profile the brand new an infection.
Subsequent, relying on what entity the malware impersonates, it opens its legit URL in a WebView and begins loading malicious modules within the background.
These embody a cookie stealer, a keylogger, an injector of phishing pages, a lock display screen PIN/sample grabber, and an SMS stealer that may snatch one-time passwords and assist the attackers bypass 2FA protections.

Most of those data-stealing techniques depend on the abuse of Accessibility Providers to work as required, permitting the malware to observe the display screen content material, monitor for particular occasions, intervene to change interface parts, or ship sure API calls as wanted.

The identical system service can be abused to forestall the uninstallation of the malware, figuring out when the sufferer makes an attempt to take away the malicious app and deleting its shared desire variables to make it seem as if it’s not current within the gadget.

The wiping of shared preferences information forces the app to re-establish communications with the C2 the following time it launches however prevents its uninstallation and makes it tougher for researchers to research.
Cyble additionally noticed code that allows Chameleon to obtain a payload throughout runtime and put it aside on the host as a “.jar” file, to be executed later by way of DexClassLoader. Nevertheless, this characteristic is at present unused.

Chameleon is an rising menace that will add extra options and capabilities in future variations.
Android customers are suggested to be cautious with apps they set up on their units, solely obtain software program from official shops, and make sure that Google Play Shield is at all times enabled.
#Chameleon #Android #malware #mimics #financial institution #govt #crypto #apps
No Comments