Description

McAfee Labs has identified a new Android banking trojan targeting users in India, capitalizing on the country’s heavy reliance on utility and banking apps to steal sensitive financial data. Named Android/Banker, the malware has already compromised 419 devices, intercepted nearly 5,000 SMS messages, and stolen over 600 pieces of bank and card information, with these numbers likely to rise. The trojan is distributed through phishing campaigns, often sent via WhatsApp, and disguises itself as legitimate utility or banking apps to deceive users into downloading malicious APKs. Once installed, the malware requests access to personal data, including SMS messages, and prompts users to enter financial details under the pretense of making payments. It then sends the stolen information to a command-and-control (C2) server while displaying a fake “payment failure” message to keep users unaware of the theft. The trojan employs advanced evasion tactics, such as hiding its app icon by omitting the “android.intent.category.LAUNCHER” attribute, making it harder for users to detect after installation. In a unique twist, this malware utilizes Supabase, an open-source backend-as-a-service, to store the stolen data. McAfee researchers discovered over 5,500 records in the malware’s Supabase database, which were accessed through an exposed JSON Web Token (JWT) in the app's code. India’s widespread use of WhatsApp makes it an ideal target for phishing, with the malware mimicking apps for popular financial and utility services like Axis Bank, Punjab National Bank, and various gas and electricity bill payment systems. Unlike previous campaigns, this trojan includes a mobile app that allows operators to manage its C2 infrastructure, enabling them to send commands, forward intercepted SMS messages, and control stolen data directly from their mobile devices.