Connect with us

Hi, what are you looking for?

HEADLINES

Ghimob emerges as new banking malware from Tétrade threat actor that targets mobile users worldwide

According to experts, the developers of this very typical mobile Remote Access Trojan (RAT) are heavily focused on users in Brazil but have big plans to expand across the globe. The campaign is still active.

When monitoring a Windows campaign from Guildma banking malware, Kaspersky researchers found URLs distributing not only a malicious .ZIP file for Windows, but also a malicious file that appeared to be a downloader to install Ghimob  – a new banking Trojan. Upon infiltrating Accessibility Mode, Ghimob can gain persistence and disable manual uninstallation, capture data, manipulate screen content and provide full remote control to the actors behind it.

According to experts, the developers of this very typical mobile Remote Access Trojan (RAT) are heavily focused on users in Brazil but have big plans to expand across the globe. The campaign is still active.

Guildma, a threat actor part of the infamous Tétrade series, known for its scalable malicious activities both in Latin America and other parts of the world, has been working actively on new techniques, developing malware and targeting fresh victims. 

Its new creation – the Ghimob banking Trojan – lures victims into installing the malicious file through an email which suggests that the person receiving it has some kind of debt. The email also includes a link for the victim to click on so they can find out more information. Once the RAT is installed, the malware sends a message about the successful infection to its server. The message includes the phone model, whether it has lock screen security and a list of all installed apps that the malware can target. In total, Ghimob can spy on 153 mobile apps, mainly from banks, fintech companies, cryptocurrencies, and exchanges.

Advertisement. Scroll to continue reading.

When it comes to functions, Ghimob is a spy in the victim’s pocket. Developers can remotely access the infected device, completing fraud using the owner’s smartphone in order to avoid machine identification and security measures implemented by financial institutions and all of their anti-fraud behavioral systems. Even if the user uses a lock screen pattern, Ghimob is able to record it and replay it to unlock the device. When the developers are ready to perform a fraudulent transaction, they can insert a black or black screen overlay or open some websites in full screen. Then, while the user looks at that screen, the developers perform the fraudulent transaction in the background, using the already opened or logged-in financial app running on the device.

Kaspersky statistics show that apart from Brazil, Ghimob targets are located in Paraguay, Peru, Portugal, Germany, Angola and Mozambique.

“Latin American cybercriminals’ desire for a mobile banking Trojan with a worldwide reach has a long history. We have already seen Basbanke, then BRata, but both were heavily focused on the Brazilian market. In fact, Ghimob is the first Brazilian mobile banking Trojan ready for international expansion,” comments Fabio Assolini, security expert at Kaspersky.

“We believe this new campaign could be related to the Guildma threat actor, responsible for a well-known Brazilian banking Trojan, due to several reasons, but mainly because they share the same infrastructure. We recommend that financial institutions watch these threats closely, while improving their authentication processes, boosting anti-fraud technology and threat intelligence data, and trying to understand and mitigate all risks of this new mobile RAT family,” adds Assolini.

Kaspersky products detect the new family as Trojan-Banker.AndroidOS.Ghimob.

Advertisement. Scroll to continue reading.

To stay safe from RAT and banking threats, Kaspersky recommends taking the following security measures:

  •  Provide your SOC team with access to the latest threat intelligence (TI). The Kaspersky Threat Intelligence Portal grants access to the company’s TI, providing cyberattack data and insights gathered by Kaspersky for more than 20 years.
  • Educate your customers on the possible tricks that malefactors may use. Regularly send them information on how to identify fraud and behave in this situation.
  • Implement an anti-fraud solution, such as Kaspersky Fraud Prevention. It can protect the mobile channel from occurrences when attackers use remote control to perform a fraudulent transaction. For protection, the solution can both detect RAT malware on the device and identify signs of remote control via legal software.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

Data privacy is more critical than ever, especially when social media platforms, AI chatbots and connected devices have increased publicly available digital footprints. This...

HEADLINES

Acting on reports about a suspicious message urging customers to click a malicious link to redeem ‘Smart points’, the telco quickly sprang into action...

HEADLINES

Likening the Converge network to a digital fortress, CISO Andrew T.  Malijan said that its battlements were strengthened in 2024 as it blocked a...

HEADLINES

ThinkShield Firmware Assurance is one of the only computer OEM solutions to enable deep visibility and protection below the operating system (OS) by embracing Zero...

HEADLINES

Kaspersky experts have uncovered a series of scams related to the growing demand, ranging from impersonating trusted brands to creating entirely fraudulent storefronts.

HEADLINES

This achievement highlights the increasing demand for Sophos’ proactive, expert-led security solutions, which help organizations of all sizes stay protected 24/7 against increasingly sophisticated...

HEADLINES

Trend's 2025 predictions report warns of the potential for malicious "digital twins," where breached/leaked personal information (PII) is used to train an LLM to...

HEADLINES

The findings show that platform security – securing the hardware and firmware of PCs, laptops and printers – is often overlooked, weakening cybersecurity posture...

Advertisement