Threat intelligence company Cyble has identified a new Android banking trojan named Antidot, which can steal users' credentials and conversations while snooping on them. Discovered in early May, Antidot masquerades as a Google Play update and uses overlay attacks to harvest victims' credentials. It boasts a wide array of capabilities, including VNC (Virtual Network Computing) for remote control, keylogging, screen recording, forwarding calls, collecting contacts and SMS messages, and performing USSD requests. Once installed, the trojan displays a fake Google Play update page in the device's language, tricking users into granting elevated permissions. Antidot then communicates with an attacker-controlled server to receive commands, enabling it to perform overlay attacks, unlock the device, make calls, send SMS messages, initiate VNC, and use the camera. The malware exploits the MediaProjection feature to capture and transmit the device's display content to the command-and-control server. Additionally, it uses an overlay attack module with WebView to display HTML phishing pages that mimic legitimate banking or cryptocurrency apps, capturing credentials when users interact with these fake interfaces. Cyble emphasizes Antidot's sophisticated and stealthy operations, including string obfuscation, encryption, and the use of fake update pages to evade detection. The trojan's targeted approach and multifaceted capabilities highlight its significant threat to users across various language-speaking regions. By utilizing these advanced techniques, Antidot aims to maximize its reach and effectiveness in stealing sensitive information.
A threat actor identified as Curly COMrades has exploited the built-in Microsoft Hyper?V hypervisor in Windows machines to deploy a minimalist Alpine Linux virtual machine (VM) hos...
Researchers have observed an active, multi-stage campaign delivering the ValleyRAT remote-access trojan (RAT) to Windows targets—frequently Chinese-language users and organisatio...
Security researchers have identified a new Remote Access Trojan, branded “EndClient RAT,” used in targeted campaigns against human-rights defenders. Attackers sign payloads wit...