HPE says hackers breached Aruba Central using stolen access key
FBI warns of Iranian hackers looking to buy US orgs’ stolen data
Telnyx is the latest VoIP provider hit with DDoS attacks
NUCLEUS:13 TCP security bugs impact critical healthcare devices
Void Balaur hackers-for-hire sell stolen mailboxes and private data
HPE says hackers breached Aruba Central using stolen access key
FBI warns of Iranian hackers looking to buy US orgs’ stolen data
Telnyx is the latest VoIP provider hit with DDoS attacks
Qualys BrowserCheck
Junkware Removal Tool
How to remove the PBlock+ adware browser extension
Remove the Toksearches.xyz Search Redirect
Remove the Smashapps.net Search Redirect
Remove the Smashappsearch.com Search Redirect
Remove Security Tool and SecurityTool (Uninstall Guide)
How to remove Antivirus 2009 (Uninstall Instructions)
How to Remove WinFixer / Virtumonde / Msevents / Trojan.vundo
How to remove Google Redirects or the TDSS, TDL3, or Alureon rootkit using TDSSKiller
Locky Ransomware Information, Help Guide, and FAQ
CryptoLocker Ransomware Information Guide and FAQ
CryptorBit and HowDecrypt Information Guide and FAQ
CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ
How to make the Start menu full screen in Windows 10
How to install the Microsoft Visual C++ 2015 Runtime
How to open an elevated PowerShell Admin prompt in Windows 10
How to Translate a Web Page in Google Chrome
How to start Windows in Safe Mode
How to remove a Trojan, Virus, Worm, or other Malware
How to show hidden files in Windows 7
How to see hidden files in Windows
IT Certification Courses
Gear + Gadgets
New Android malware targets Netflix, Instagram, and Twitter users
A new Android malware known as MasterFred uses fake login overlays to steal the credit card information of Netflix, Instagram, and Twitter users.
This new Android banking trojan also targets bank customers with custom fake login overlays in multiple languages.
A MasterFred sample was first submitted to VirusTotal in June 2021 and was first spotted in June. Malware analyst Alberto Segura also shared online a second sample one week ago, pointing out that it was used against Android users from Poland and Turkey.
After analyzing the new malware, Avast Threat Labs researchers discovered APIs provided by the built-in Android Accessibility service to display the malicious overlays.
“By utilizing the Application Accessibility toolkit installed on Android by default, the attacker is able to use the application to implement the Overlay attack to trick the user into entering credit card information for fake account breaches on both Netflix and Twitter,” Avast said.
The malicious use of the Accessibility service is not something new since malware creators have been using it to simulate taps and navigate the Android UI install their payloads, download and install other malware, and execute various operations in the background.
It seems there is an undetected Android #Banker affecting Turkey and Poland..


cc @malwrhunterteam pic.twitter.com/aUm5ibSFYQ
However, some things make MasterFred stand out. One of them is that the malicious apps used to deliver the malware on Android devices also bundle the HTML overlays used to display the fake login forms and harvest the victims’ financial info.
The malware also uses the Onion.ws dark web gateway (aka Tor2Web proxy) to deliver the stolen information to Tor network servers under its operator’s control.
Since at least one of the malicious apps bundling the MasterFred banker was recently available in Google’s Play Store, it’s safe to say that MasterFred’s operators are also likely using third-party stores as a delivery channel for this new malware.
“We can say that at least one application was delivered via Google play. We believe that it has been removed already,” Avast’s research team told BleepingComputer.
Indicators of compromise (IOCs), including MasterFred sample hashes and command-and-control server domains, can be found in Avast Threat Labs’ Twitter thread.
Flubot Android malware now spreads via fake security updates
PhoneSpy: Android spyware campaign targeting South Korean users
Stealthier version of Mekotio banking trojan spotted in the wild
Android spyware spreading as antivirus software in Japan
New AbstractEmu malware roots Android devices, evades detection
Not a member yet? Register Now
Microsoft urges Exchange admins to patch bug exploited in the wild
Microsoft November 2021 Patch Tuesday fixes 6 zero-days, 55 flaws
To receive periodic updates and news from BleepingComputer, please use the form below.
Terms of Use Privacy PolicyEthics Statement
Copyright @ 2003 – 2021 Bleeping Computer® LLC – All Rights Reserved
Not a member yet? Register Now
Read our posting guidelinese to learn what content is prohibited.


You May Also Like

Here are the new Emotet spam campaigns hitting mailboxes worldwide

Windows 10 21H2 is released, here are the new featuresNew Rowhammer technique…

Microsoft: These are the building blocks of QBot malware attacks

New zero-day exploit for Log4j Java library is an enterprise nightmareALPHV BlackCat…

Malicious Notepad++ installers push StrongPity malware

ALPHV BlackCat – This year’s most sophisticated ransomwareSonicWall ‘strongly urges’ customers to…

Researchers release 'vaccine' for critical Log4Shell vulnerability

New zero-day exploit for Log4j Java library is an enterprise nightmareALPHV BlackCat…