New Android Banking Trojan targets Japanese banks via SMS
ESET security researchers found a new Android Banking Trojan that targets Japanese banks via SMS.
Android Banking Trojan spreads in #Japan 🇯🇵 via SMS targeting Japanese banks.
Text of spreading SMS is dynamically received from server.
Can update itself via fake update notification.
Can bypass SMS 2FA.
C&C server is alive. pic.twitter.com/G7NswV2vmf— Lukas Stefanko (@LukasStefanko) August 24, 2018
The Trojan can update itself by false update notifications and bypass SMS two-factor authentication. It is rumoured that cybercriminals aim to trick victims into downloading the Trojan, with the goal of stealing credentials to access targets, stealing funds and performing other fraudulent actions. The current range of this Trojan is limited to Asian countries, but it may soon spread to other regions.