Malicious "shape shifters"
Friday, November 24, 2017
There exists an enormous diversity of Trojans. And among them there are particularly notable species—"shape shifters". These are rare and, perhaps, quite instructive phenomena.
LokiBot (detected by Dr.Web as Android.BankBot.235.origin) is a banking Trojan that can turn into ransomware and lock a smartphone if its owner tries to delete it.
https://clientsidedetection.com/lokibot___the_first_hybrid_android_malware.html
This is not the most basic description, but you get the idea. The Trojan takes its time to covertly gather information and steal money, but should the user suspect that something's wrong or start looking for the Trojan's processes and end them, it will bare its teeth and turn into ransomware.
As a banking Trojan, LokiBot is hardly a standout.
Similar to other species of this kind, LokiBot fakes popular remote banking applications as well as the authorisation dialogues of Skype, Outlook and WhatsApp.
https://clientsidedetection.com/lokibot___the_first_hybrid_android_malware.html
This means that in a best-case scenario, a user who attempts to sign in to Skype, Outlook or WhatsApp may be interacting with the applications via the Trojan.
The malicious program also uses social engineering techniques to gather banking information—it puts out a notification about money being credited to the victim's account. By doing so, it lures the user into entering their online banking login and passwords which are instantly intercepted.
The Trojan's authors, following current trends, also seek to profit from selling the Trojan to other criminals.
The new malware can be purchased online for only $2,000. For this amount, a cybercriminal will get a program with unique features: LokiBot can use SOCKS5 proxy, redirect users' outbound traffic, and load webpages in the browser. It uses SMS to send messages to all the contacts on a device and gets those users’ devices infected.
https://clientsidedetection.com/lokibot___the_first_hybrid_android_malware.html
Interestingly, when acting as encryption ransomware, the Trojan also deceives users—files are merely moved to a different location.
#Trojan.Encoder #virus-maker #extortion #fraud #encryption_ransomware #ransomwareThe Anti-virus Times recommends
Unfortunately, by discovering and deleting malware manually, many people believe they can do without an anti-virus. LokiBot specifically targets overconfident users like these.
Currently, the Trojan is not equipped with all the features of encryption ransomware, but it quite possibly will be in the near future. At the moment it can be neutralised without an anti-virus, but why take unnecessary risks?
Tell us what you think
To leave a comment, you need to log in under your Doctor Web site account. If you don't have an account yet, you can create one.
Comments
Неуёмный Обыватель
20:47:33 2018-07-25
vasvet
07:34:27 2018-07-24