Security News > 2022 > December > Godfather malware makes banking apps an offer they can’t refuse
Crooks are using an Android banking Trojan dubbed Godfather to steal from banking and cryptocurrency exchange app users in 16 countries, according to Group-IB security researchers.
The security firm first detected Godfather in June 2021 and as of October, the credential-stealing malware has targeted the users of more than 400 applications.
Godfather is essentially an updated version of the Anubis banking Trojan, according to the security researchers, who found that both share the same code base.
Legit Android apps poisoned by sticky 'Zombinder' malware Good news, URSNIF no longer a banking trojan.
In addition to exfiltrating users' credentials, Godfather also sends push notifications to harvest users' two-factor authentication codes.
Once they've stolen users' credentials and codes, they can steal all the funds from the banking accounts or crypto wallets.
News URL
https://go.theregister.com/feed/www.theregister.com/2022/12/22/godfather_banking_trojan/
Related news
- Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack (source)
- New Grandoreiro Banking Malware Variants Emerge with Advanced Tactics to Evade Detection (source)
- New FakeCall Malware Variant Hijacks Android Devices for Fraudulent Banking Calls (source)
- New Android Banking Malware 'ToxicPanda' Targets Users with Fraudulent Money Transfers (source)