A newly identified remote access Trojan (RAT) called BingoMod is targeting Android users, primarily to initiate unauthorized money transfers on infected devices. It can also wipe the device after completing its malicious activities, leaving no trace. In May 2024, security firm Cleafy discovered and analyzed BingoMod. Disguised as a legitimate mobile security app, the malware prompts users to grant access to Accessibility Services once installed—a commonly exploited feature that allows apps to gain extensive permissions. If granted, BingoMod activates its malicious payload. Operating covertly in the background, BingoMod employs keylogging and SMS interception to steal sensitive user credentials. With this information, attackers gain control of the device to carry out unauthorized money transfers. After completing a fraudulent transfer, the malware wipes the device to obstruct forensic investigations. BingoMod has advanced features, including overlay attacks and VNC-like remote access, allowing attackers to interact with the compromised device in real-time. It can launch phishing attacks through overlays and fake notifications directly controlled by the malware operator. Additionally, BingoMod can send SMS messages from the compromised device to spread itself further. Cleafy’s analysis revealed that BingoMod targets devices set to English, Romanian, and Italian. The malware’s code suggests its developers may be Romanian speakers. As part of the latest generation of mobile RATs, BingoMod enables attackers to conduct account takeover operations directly from infected devices. However, it requires live operators to authorize transactions, limiting its scalability. To protect itself, BingoMod complicates system settings modifications, restricts certain apps, and may uninstall others if needed.
A group of automated vulnerability discovery agents, led by security researcher Asim Viladi Oglu Manizada, has identified two severe flaws in the Common UNIX Printing System (CUPS)...
Cybersecurity researchers have uncovered critical vulnerabilities in the Windmill developer platform and its integration with Nextcloud Flow, allowing attackers to gain full system...