BTC $58379.9472
ETH $2982.7872
BNB $563.0335
SOL $134.7235
XRP $0.5177
stETH $2971.9755
DOGE $0.1303
TON $4.8905
ADA $0.4503
AVAX $33.3328
TRX $0.1205
wstETH $3474.4227
DOT $6.8866
WETH $2975.5564
WBTC $58376.0680
BCH $424.7496
LINK $13.3612
MATIC $0.6924
UNI $7.0434
ICP $13.2308
LTC $80.1663
DAI $1.0012
FDUSD $1.0026
CAKE $2.5276
RNDR $7.6591
IMX $2.0284
ETC $25.5672
NEAR $6.1572
HBAR $0.0999
FIL $5.7239
STX $2.1417
MNT $0.9501
PEPE $0.0000
OKB $48.7666
ATOM $8.7518
WIF $2.6145
VET $0.0353
KAS $0.1092
TAO $382.3435
MKR $2726.6998
USDE $0.9992
GRT $0.2436
XMR $123.2867
XLM $0.1111
FET $2.0170
INJ $23.7176
THETA $2.0387
BTC $58379.9472
ETH $2982.7872
BNB $563.0335
SOL $134.7235
XRP $0.5177
stETH $2971.9755
DOGE $0.1303
TON $4.8905
ADA $0.4503
AVAX $33.3328
TRX $0.1205
wstETH $3474.4227
DOT $6.8866
WETH $2975.5564
WBTC $58376.0680
BCH $424.7496
LINK $13.3612
MATIC $0.6924
UNI $7.0434
ICP $13.2308
LTC $80.1663
DAI $1.0012
FDUSD $1.0026
CAKE $2.5276
RNDR $7.6591
IMX $2.0284
ETC $25.5672
NEAR $6.1572
HBAR $0.0999
FIL $5.7239
STX $2.1417
MNT $0.9501
PEPE $0.0000
OKB $48.7666
ATOM $8.7518
WIF $2.6145
VET $0.0353
KAS $0.1092
TAO $382.3435
MKR $2726.6998
USDE $0.9992
GRT $0.2436
XMR $123.2867
XLM $0.1111
FET $2.0170
INJ $23.7176
THETA $2.0387
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Trojan Drinik for Android targets users of one of the largest banks in the world


    Analysts at Cyble said that a new Android version of the Drinik Trojan targets 18 Indian banks and masquerades as the country's official tax app to steal victims' personal information and bank credentials.

    According to experts, Drinik has been attacking India since 2016, but since September 2021 it has been operating as a banking Trojan for Android with the following features:

    • screen recording;
    • logging activities;
    • use of accessibility services;
    • execution of overlay attacks.

    The latest version of Drinik comes in the form of an APK file of the iAssist app, which is supposedly the official tax management tool in India. Once installed, it asks for permission to access SMS, the user's call log, and external storage.

    Drinik also asks for permission to use the Accessibility Service. Once accessed, the malware disables Google Play Protect and uses it to perform navigation gestures, screen recording, and capture keystrokes.

    As a result, Drinik loads a real Indian tax administration site via WebView and steals the user's credentials by recording the screen and using a keylogger.

    At this point, a bogus dialog box is displayed offering the user a $700 tax refund due to previous tax miscalculations.

    When the user agrees and clicks the "Accept" button, he is redirected to a phishing page that is a clone of the real site of the Department of Income Tax, where he needs to enter payment details.

    In order to target the 18 banks in India, Drinik constantly monitors the accessibility service for events and keywords related to targeted banking applications.

    If there are matches, the malware collects the keylogger data containing the user's credentials and exfiltrates it to the command and control (C&C) server. During the attack, Drinik uses the "CallScreeningService" to deny incoming calls that could interrupt the login.

    One of the target banks is the State Bank of India (SBI), one of the largest banks in the world, serving 450 million people through an extensive network of 22,000 branches.

    The harassment of Indian taxpayers and banking customers means that Drinik has a huge pool of targets, so every new successful feature potentially results in significant financial gains for malware operators.

    Author DeepWeb
    Where do new drugs come from?
    Fraudsters robbed NFT enthusiasts

    Comments 0

    Add comment