Italian cybersecurity firm Cleafy has found “Nexus”, a new Android Trojan capable of hijacking online accounts and siphoning funds from them, to be targeting customers from 450 banks and cryptocurrency services worldwide.
First observed in June 2022 as a variant of SOVA, another Android banking Trojan, Nexus has since improved targeting capabilities and is available via a malware-as-a-service (MaaS) program for $3000 a month, and allows other attackers to rent or subscribe to the malware for personal attacks.
Multiple campaigns active worldwide confirm that multiple threat actors are already using this thread to conduct fraudulent campaigns, according to a Cleafy report.
Nexus hacks android controls to steal user credentials
Cleafy observed Nexus to be employing several techniques for account takeover. One such technique involves performing overlay attacks and logging keystrokes to steal user credentials. When a customer of a targeted banking or cryptocurrency app uses his or her compromised android device, Nexus redirects them to a page masquerading as a genuine app login page and grabs the victim’s credentials using an embedded keylogger.
Nexus, like many banking Trojans, can gain access to online accounts by grabbing two-factor authentication codes from an intercepted SMS. The Trojan was found to be stealing seeds and balance information from cryptocurrency wallets, cookies from targeted websites, and two-factor codes of Google’s Authenticator app using Android’s “Accessibility services” features.
Cleafy found Nexus to have developed newer capabilities, which were absent in last year’s SOVA variant, including abilities to delete received authentication SMS messages, stop or activate the module for stealing Google Authenticator 2FA codes, and periodically check its own command-and-control server (C2) for updates and for automatically installing any that might become available.
Modules have amateur giveaways, still striving for perfection
Despite its versatility for account takeovers and global reach, Cleafy designates Nexus to still be a “work in progress”. This is mainly due to the presence of debugging strings and the lack of usage references in certain modules of the malware.
The relatively high number of logging messages in the code suggests inadequate tracking and reporting of malware actions. Moreover, the current version of the malware does not sport a Virtual Network Computing (VNC) module for a complete remote-control takeover of a Nexus-infected device.
The VNC module allows threat actors to perform on-device fraud, one of the most dangerous types of fraud since money transfers are initiated from the same device used by victims daily, the report said.
A module still under development, as observed by Cleafy, seems to have encryption capabilities mostly for obfuscation purposes after a complete account takeover.
Copyright © 2023 IDG Communications, Inc.