Anubis Android Malware

News Mjolnir Security todayMay 29, 2022 356 1

Background
share close

Anubis first appeared on Russian hacking forums in 2016, shared as an open-source banking trojan with instructions on implementing its client and components.

In the years that followed, Anubis received further development work, and its newer code continued to be openly shared between actors.

In 2019, the malware added what appeared to be an almost functional ransomware module and found its way into Google’s Play Store through fake apps.

In 2020, Anubis returned through large-scale phishing campaigns, targeting 250 shopping and banking apps.

Anubis will display fake phishing login forms when users open up apps for targeted platforms to steal credentials. This overlay screen will be shown over the real app’s login screen to make victims think it’s a legitimate login form when in reality, inputted credentials are sent to the attackers.

There is no concrete information on the actors who currently distribute Anubis, as they were careful enough to hide their C2 infrastructure registration trace.

In the last week, our intelligence analysts identified new domains used to spread the malware campaign.

You can find the IOCs here: https://otx.alienvault.com/pulse/6293f0b30be7983c4bae2879

Written by: Mjolnir Security

Previous post

todayFebruary 3, 2021

  • 184
  • 1
Featuredstar
close

Botnet Mjolnir Security

Fall of Emotet

On January 27, 2021, news broke from Europol that a collaborative effort had effectively taken down and disrupted one of the most significant botnets in the past decade – Emotet. ...


Similar posts

News Mjolnir Security / July 9, 2024

Balancing AI Innovation with Privacy: Navigating the Complex Landscape of Privacy Laws

The integration of artificial intelligence (AI) in various sectors has ushered in an era of unprecedented innovation and efficiency. However, as organizations increasingly rely on AI to process and analyze vast amounts of data, concerns about privacy and compliance with regulatory requirements have come to the forefront. This blog post will delve into the complex ...

Read more trending_flat