Government Abstract
The zLabs analysis staff has found a cell malware marketing campaign consisting of virtually 900 malware samples primarily focusing on customers of Indian banks. Evaluation of the collected samples reveals shared code constructions, person interface components, and app logos, suggesting a coordinated effort by a single risk actor focusing on cell gadgets working the Android OS. Zimperium’s dynamic, on-device detection engine efficiently detected a number of cases of this malware, categorizing them as Trojan Bankers particularly designed to focus on monetary establishments in India.
Not like typical banking Trojans that rely solely on command-and-control (C&C) servers for one-time password (OTP) theft, this malware marketing campaign leverages reside cellphone numbers to redirect SMS messages, leaving a traceable digital path for regulation enforcement companies to trace the risk actors behind this marketing campaign. Our staff recognized roughly 1,000 cellphone numbers used on this marketing campaign, which will probably be shared with authorities upon request.
Moreover, our researchers found over 222 publicly accessible Firebase storage buckets containing 2.5GB of delicate information, together with SMS messages from Indian banks, financial institution particulars, card particulars, and government-issued identification particulars. This publicity includes an estimated 50,000 customers, demonstrating the marketing campaign’s intensive attain and severity.
Modus Operandi
The malware is distributed by WhatsApp as APK recordsdata masquerading as authentic authorities or banking functions. As soon as put in, these apps deceive customers into disclosing delicate monetary and private particulars, akin to:
- Aadhar Card (equal to a Social Safety Quantity)
- PAN Card (used for taxation and financial institution linking)
- Credit score and debit card data
- ATM PINs and cell banking credentials

The malware exploits SMS permissions to intercept and exfiltrate messages, together with OTP’s, facilitating unauthorized transactions. Moreover, it employs stealth strategies to cover its icon and resist uninstallation, guaranteeing persistence on the compromised gadgets.
Technical Evaluation
In keeping with our analysis, this banker malware household has three distinct variants
- SMS Forwarding: Captures and forwards stolen SMS messages to an attacker-controlled cellphone quantity.
- Firebase-Exfiltration: Exfiltrates stolen SMS messages to a Firebase endpoint, which acts as a command-and-control server.
- Hybrid: Combines each strategies, forwarding stolen SMS messages to a cellphone quantity and a Firebase endpoint.
Over 1,000 malicious functions linked to this malicious marketing campaign have been collected and analyzed. These malicious functions make the most of code obfuscation and packing strategies to evade detection and make reverse engineering tough. Hardcoded cellphone numbers, found inside sure variants of the apps, function exfiltration factors for OTPs and SMS messages, suggesting that these numbers are both straight managed by the attackers or belong to compromised people underneath their management.


The variants that exfiltrated information to Firebase uncovered private data to the general public by sending it to an unsecured, publicly accessible endpoint.
Firebase Endpoint & Dashboard Observations
Evaluation of the Firebase endpoints revealed that each one information exfiltrated from the sufferer’s gadgets was brazenly accessible to anybody, because the endpoint lacked any authentication or authorization mechanisms.
- The JSON information retrieved from these endpoints uncovered crucial administrator particulars, together with: Credentials for the C&C platform used to gather and handle stolen information.
- The cellphone quantity designated for SMS exfiltration (if not hardcoded within the malware itself).

The leaked credentials allowed unauthorized entry to the executive dashboard utilized by the attackers to set the configurations and present all of the stolen information.

The dashboard featured an “Admin Whatsapp” button on the backside. This button opens a WhatsApp net or app window, displaying the admin’s cellphone quantity. This means a multi-user atmosphere the place a number of risk actors can function the dashboard and simply contact the admin for help straight from throughout the dashboard.
Attacker’s SIM-Location Evaluation
Analyzing cellphone numbers embedded within the malware, our researchers traced their registrations to particular areas in India. Nearly all of these cellphone numbers had been linked to be registered in West Bengal, Bihar, and Jharkhand, collectively accounting for roughly 63% of the full.
Exfiltrated Messages Distribution
The overwhelming majority of uncovered information consists of SMS messages. Our staff analyzed the exfiltrated messages to determine bank-originated SMS and their distribution throughout the completely different banks.
Banks Focused within the Marketing campaign
Menace actors capitalized on the credibility and belief of banks and authorities companies to extend its attain and distribution inside India. By analyzing the app icons utilized by completely different samples, we recognized essentially the most generally impersonated monetary entities.

The proliferation of digital funds in India has led to a rise in mobile-based monetary fraud. Provided that OTP’s stay a crucial authentication mechanism, risk actors are more and more deploying SMS-stealing malware to bypass this safety layer. By combining credential theft, SMS interception and phishing strategies, these actors can execute unauthorized transactions and drain victims’ financial institution accounts by way of their cell gadgets.
Zimperium vs. FatBoyPanel
To successfully safeguard workers and prospects from superior malware threats, enterprises should deploy proactive and sturdy safety options that defend each worker gadgets and customer-facing cell functions. Zimperium is uniquely positioned to defend towards these threats with its industry-leading on-device detection capabilities and complete Cell Utility Safety Suite (MAPS).
Zimperium’s Cell Menace Protection (MTD) answer supplies real-time, on-device safety towards refined malware, phishing makes an attempt, and unauthorized entry. By leveraging superior machine studying and behavioral evaluation straight on the machine, MTD ensures workers can work securely with out counting on cloud-based detection, thereby lowering response occasions and preserving person privateness. This proactive protection helps enterprises defend delicate information, safe their workforce, and preserve enterprise continuity.
Moreover, Zimperium’s MAPS secures internally developed cell functions towards reverse engineering, tampering, and unauthorized entry. By embedding superior safety controls straight into the app, MAPS ensures cell functions stay shielded from exploitation each in app shops and on end-user gadgets. This prevents pricey breaches, enhances regulatory compliance, and reinforces buyer belief in digital banking and monetary providers.
Powered by Zimperium’s proprietary On-System Dynamic Detection Engine, each MTD and MAPS options make the most of cutting-edge machine studying, deterministic detection, and behavioral evaluation to ship unparalleled risk visibility and steady safety. Not like conventional cloud-dependent options, Zimperium’s on-device strategy permits enterprises to detect and neutralize even essentially the most superior, zero-day threats with out compromising person privateness or utility efficiency.
The effectiveness of Zimperium’s expertise is underscored by its potential to detect and mitigate all malware samples and malicious URLs recognized on this analysis, proving its unmatched functionality in defending mobile-first enterprises towards evolving cyber threats.
MITRE ATT&CK Strategies
To assist our prospects and the {industry} perceive the influence of this malware, Zimperium has compiled the next desk containing the MITRE Ways and Strategies as reference.
Tactic | ID | Title | Description |
Preliminary Entry | T1660 | Phishing | Adversaries ship malicious content material to customers with the intention to acquire entry to their machine. |
Persistence | T1624.001 | Occasion Triggered Execution: Broadcast Receivers | It creates a broadcast receiver to obtain SMS occasions and outgoing calls. |
Credential Entry | T1417.002 | Enter Seize: GUI Enter Seize | It is ready to get the proven UI. |
T1635 | Steal Utility Entry Token | It steals OTPs. | |
Discovery | T1426 | System Data Discovery | It will get information in regards to the machine because the androidID. |
Assortment | T1417.002 | Enter Seize: GUI Enter Seize | It is ready to get the proven UI. |
T1636.003 | Protected Consumer Knowledge: Contact Record | It exports the machine’s contacts. | |
T1636.004 | Protected Consumer Knowledge: SMS Messages | It exfiltrates all of the incoming OTP SMS messages. | |
Command and Management | T1637 | Dynamic Decision | It receives the injected HTML payload endpoint dynamically from the server. |
T1481.002 | Net Service: Bidirectional Communication | It makes use of websocket communication to ballot the TA’s server and get the instructions to execute. | |
Exfiltration | T1639.001 | Exfiltration Over Various Protocol: Exfiltration Over Unencrypted Non-C2 Protocol | The stolen credentials are despatched to a unique C2. |
Impression | T1516 | Enter Injection | It shows inject payloads like sample lock and mimics banking apps login display screen by overlay and steal credentials. |
T1582 | SMS Management | It might learn and ship SMS. |
Indicators of Compromise
The IOCs for this marketing campaign might be discovered right here.