Over 300,000 Android devices infected with banking Trojan: Kaspersky Labs

Modified mobile banking trojan Svpeng found hiding in Google AdSense network accessed through exploit in Google Chrome

By: ANI | Woburn | Updated: November 9, 2016 3:27 pm
android malware, google malware, smartphone malware, cyber attack, Kaspersky labs, Trojan, trojan affects smartphones, mobile banking trojan, Google Adsense infected, Google Chrome exploit, modified Svpeng trojan, Android exploit, Google android infection, bank card exploit, personal data exploit, android device exploit, technology, technology news Google Chrome vulnerability exploited by Svpeng Trojan, according to Kaspersky Lab. (Image source: Reuters) 

Kaspersky Lab experts recently discovered a modification of the mobile banking Trojan, Svpeng hiding in Google’s advertising network AdSense. Since mid-July, Svpeng has been detected on the Android devices of around 318,000 users, with the rate of infection peaking at 37,000 victims in a day. The attackers, intent on stealing bank card information and personal data such as contacts and call history, were exploiting a bug in Google Chrome for Android. Now that Google has fixed the bug, Kaspersky Lab experts can reveal the full details of the attack.

The first known case of a Svpeng attack using the bug in Chrome for Android occurred in mid-July on an online Russian news outlet. During the attack, the Trojan silently downloaded itself onto the Android devices of the website’s visitors.

In un-ravelling the attack process, Kaspersky Lab researchers found that the campaign started with an infected advert being placed on Google AdSense. The advert displayed normally on uninfected web pages, with the Trojan only downloading when the user accessed the page via the Chrome browser on an Android device.

Svpeng disguised itself as an important browser update or popular application, to convince the user to approve the installation. Once the malware was launched it disappeared from the list of installed apps and asked the user to give it device admin rights.

It appeared that the attackers had found a way to bypass some key security features of Google Chrome for Android. Normally, when an APK file is downloaded on a mobile device via an external web link, the browser displays a warning that a potentially dangerous object is being downloaded. In this case, fraudsters found a security flaw that allowed APK files to be downloaded without notifying users.

On discovering the bug, Kaspersky Lab immediately reported the issue to Google. The patch will be issued in the nearest Google Chrome for Android update.

“The Svpeng case confirms, yet again, the importance of cooperation between companies. We share a common goal to protect users from cyber-attack, and it is vital that we work together to achieve this. We are happy to help make the Android ecosystem safer, and would like to thank Google for its prompt response to our report,” said Malware analyst at Kaspersky Lab, Nikita Buchka.

“We also urge users to avoid downloading applications from un-trusted sources and to be cautious when it comes to what permissions they are asked to give and why,” said Nikita Buchka, Malware analyst at Kaspersky Lab,” added Buchka.

Kaspersky Lab advises customers to upgrade the Chrome for Android browser to the latest version, install an effective security solution and to be aware of the tools and techniques used by malware authors to trick them into installing malicious software and agreeing to far-reaching device rights.

The Svpeng mobile banking Trojan is designed to steal bank card information. It also collects call history, text and multimedia messages, browser bookmarks and contacts. Svpeng mainly attacks Russian-speaking countries, however it has the potential to spread globally. Due to the specific nature of the malware distribution, millions of web-pages globally are at risk, with many of them using AdSense to display adverts.