The new trojan is being distributed via third-party online app stores and fortunately, isn't on the Google Play Store.
Apple iPhone XR 64GB at Lowest Price Ever
6.1" display | 50% Faster Graphics performance | TrueDepth camera
Click here to know more
Security researchers at ESET have discovered a new Android Trojan that has the potential to cause considerable monetary damage to users. As per WeLiveSecurity, a new Android malware can steal money from a victim’s PayPal account, even with 2-Factor Authentication (2-FA) turned on. The trojan has been disguised as a battery optimisation app called “Optimization Android,” which is being distributed via third-party online app stores and not the Google Play Store. Once the app is installed and launched, it will boot and close immediately. Then, the user will be requested to grant Accessibility permission, which will give the app complete authority but this process is masqueraded as “enable statistics.”
Lukas Stefanko from WeLiveSecurity also posted a video of the trojan in action. In the video below, you will notice that the app sends a notification to the user after it’s installed, which states “Confirm your account immediately.” Tapping on the notification boots up the official PayPal application on their phone and any unsuspecting user would sign-in like they would normally do, even with the 2-FA enabled. However, as soon as the user signs in, the trojan then automatically fast forwards through the money transfer process by emulating taps, which it can do so because of the access to accessibility service. In the video below, you might notice that it automatically sends $100,000 to the attacker’s PayPal address. The malware is said to change the currency used based on a user’s location.
The Trojan takes less than five seconds to automatically send money from the victim’s PayPal account. As per WeLiveSecurity, the process is only halted if the user has not linked any payment card to the account or if there’s insufficient PayPal balance. Additionally, the trojan’s malicious Accessibility service keeps waiting in the background and activates as soon as the PayPal app is booted. This means that it can automatically transfer money from the victim’s account multiple times. WeLiveSecurity has reported this malicious technique to PayPal, along with the account used by the attacker to receive stolen funds.
There’s also an additional method by which the trojan can steal user’s credentials. It uses a screen overlay that draws over apps like Google Play, Skype, WhatsApp, and others that ask users for their payment information. When users enter their credit card details, the overlay attempts to steal the information. Do note that an invalid input is also accepted by the overlay and it disappears. However, there’s still a chance of user’s data being stolen if they enter the correct details on the first go.
As mentioned earlier, the trojan is not on the Google Play Store and thus, there’s a lesser chance of users falling a victim to it. Unless, of course, you download apps from third-party websites. WeLiveSecurity suggests that one turns off third-party app installs on their phone and download apps only from the official Android app market.
Digit caters to the largest community of tech buyers, users and enthusiasts in India. The all new Digit in continues the legacy of Thinkdigit.com as one of the largest portals in India committed to technology users and buyers. Digit is also one of the most trusted names when it comes to technology reviews and buying advice and is home to the Digit Test Lab, India's most proficient center for testing and reviewing technology products.
We are about leadership-the 9.9 kind! Building a leading media company out of India.And,grooming new leaders for this promising industry.