Octo Android banking malware

Android banking malware named Octo has appeared in the wild, featuring remote access capabilities that allow malicious operators to perform on-device fraud.

What is Octo ?



Octo is an evolved Android malware based on ExoCompact, a malware variant based on the Exo trojan that quit the cybercrime space and had its source code leaked in 2018.


According to the information we were able to unearth, the trojan has been sold as early as mid-June 2016, when its creator (or one of its creators) had opened a topic on a Russian-speaking hacking forum.
Shortly after, a listing appeared on AlphaBay, the largest Dark Web marketplace for illegal products.

The trojan is currently sold at different prices, depending where you see an ad for it, but Exo is rented out on a weekly, monthly, or yearly basis.

According to its creator(s), Exo is worth its price. First of all, Exo works on Android versions 4, 5, and 6. In some ads, it's also advertised as working on Android 7, but this may be just false advertising, since not all listings advertise this feature.

Furthermore, crooks boast that the trojan doesn't need root access to work and that users can't uninstall it manually, meaning they need to do a complete phone reflashing to get rid of Exo.

About the life cycle of malware is how malicious code packages evolve over time. It's a case of threat actors grabbing something that works and then improving or extending it. One example is a breed of banking malware that first popped up in 2016 called Exobot. It went after users in several countries until 2018 when it morphed into ExobotCompact, a remote access trojan (RAT) with several additional subtypes. And recently, cybersecurity researchers discovered Octo, a new RAT that essentially evolved from Exobot but has even more deceptive features like the one that lets the trojan hide its activities even as it turns your phone into a vehicle for committing fraud.

Octo has a lot in common with ExobotCompact, including measures to prevent reverse-engineering the malware and coding that makes it easy to hide inside an innocent-seeming app on the Google Play Store as well as the neat trick of disabling Google Protect upon download. What sets Octo apart, on-device fraud (ODF) functionality. While ODF isn't new to the malware ecosphere, it is the quirk that distinguishes Octo from the rest of the Exobot family of malicious apps.

The remote access is provided through a live screen streaming module (updated every second) through Android's MediaProjection and remote actions through the Accessibility Service.

Octo uses a black screen overlay to hide the victim's remote operations, sets screen brightness to zero, and disables all notifications by activating the "no interruption" mode.

By making the device appear to be turned off, the malware can perform various tasks without the victim knowing. These tasks include screen taps, gestures, text writing, clipboard modification, data pasting, and scrolling up and down.

Apart from the remote access system, Octo also features a powerful keylogger that can monitor and capture all victims' actions on infected Android devices.

This includes entered PINs, opened websites, clicks and elements clicked, focus-changing events, and text-changing events.

Some Octo operators managed to infiltrate the Play Store again after the Fast Cleaner operation was over, using an app named "Pocket Screencaster."

The full list of known Android apps containing the Octo malware is listed below:
  • Pocket Screencaster (com.moh.screen)
  • Fast Cleaner 2021 (vizeeva.fast.cleaner)
  • Play Store (com.restthe71)
  • Postbank Security (com.carbuildz)
  • Pocket Screencaster (com.cutthousandjs)
  • BAWAG PSK Security (com.frontwonder2), and
  • Play Store app install (com.theseeye5)

Finally, Octo supports an extensive list of commands, with the most important being:
  • Block push notifications from specified applications
  • Enable SMS interception
  • Disable sound and temporarily lock the device's screen
  • Launch a specified application
  • Start/stop remote access session
  • Update list of C2s
  • Open specified URL
  • Send SMS with specified text to a specified phone number

Anything the user sees on their device's screen becomes within the access of these malware variants, so after infection, no information is safe, and no protection measure is effective.

That said, users need to remain vigilant, keep the number of apps installed on their smartphones at a minimum, and regularly check to ensure Play Protect is enabled.


Source: 
Previous Post Next Post