Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Android Malware Mimics as SBI Card, Axis Bank Apps to Steal Users Financial Data

New Android Malware Mimics as SBI Card, Axis Bank Apps to Steal Users Financial Data

Posted on August 5, 2025August 5, 2025 By CWS

A complicated new Android malware marketing campaign has emerged focusing on Indian banking prospects by convincing impersonations of common monetary purposes.

The malicious software program masquerades as reputable apps from main Indian monetary establishments, together with SBI Card, Axis Financial institution, Indusind Financial institution, ICICI, and Kotak, deceiving customers into downloading pretend purposes that steal delicate monetary data.

The malware operates by rigorously crafted phishing web sites that carefully replicate official banking portals, incorporating genuine visible components and branding to ascertain credibility.

Phishing web site (Supply – McAfee)

These fraudulent websites characteristic distinguished “Get App” and “Obtain” buttons that immediate unsuspecting customers to put in malicious APK information disguised as official banking purposes.

The marketing campaign particularly targets Hindi-speaking customers throughout India, leveraging cultural and linguistic familiarity to reinforce its misleading effectiveness.

McAfee researchers recognized this risk as significantly harmful resulting from its dual-purpose structure that mixes conventional banking fraud with cryptocurrency mining capabilities.

The malware not solely harvests private and monetary knowledge but in addition silently mines Monero cryptocurrency on contaminated units, maximizing the attackers’ monetary features from every compromised gadget.

What distinguishes this marketing campaign from standard banking trojans is its subtle evasion mechanisms and distant activation capabilities.

Upon set up, the malware presents customers with a pretend Google Play Retailer interface suggesting an app replace is required.

Preliminary display screen proven by the dropper app (Supply – McAfee)

This misleading tactic builds consumer confidence whereas the malware prepares its malicious payload.

Superior Payload Supply and Execution Mechanism

The malware employs a complicated two-stage payload supply system designed to evade static evaluation and detection.

Initially functioning as a dropper, the applying shops an encrypted DEX file inside its belongings folder, which serves because the first-stage loader part.

This encrypted payload is obfuscated utilizing XOR encryption, stopping rapid detection by safety scanners.

The primary-stage loader decrypts and dynamically hundreds a second encrypted file containing the precise malicious payload.

This layered method ensures that no clearly malicious code seems in the principle APK file, complicating forensic evaluation and automatic detection methods.

Pretend card verification display screen (Supply – McAfee)

As soon as the ultimate payload executes, it presents victims with convincing pretend banking interfaces that seize delicate data together with card numbers, CVV codes, and private particulars.

The cryptocurrency mining performance operates by Firebase Cloud Messaging, permitting attackers to remotely set off mining operations utilizing XMRig software program.

The malware downloads encrypted mining binaries from hardcoded URLs and executes them utilizing ProcessBuilder, producing Monero cryptocurrency whereas remaining largely undetected on contaminated units.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Strive 50 Free Trial Searches

Cyber Security News Tags:Android, Apps, Axis, Bank, Card, Data, Financial, Malware, Mimics, SBI, Steal, Users

Post navigation

Previous Post: NVIDIA Triton Vulnerability Chain Let Attackers Take Over AI Server Control
Next Post: 15,000 Fake TikTok Shop Domains Deliver Malware, Steal Crypto via AI-Driven Scam Campaign

Related Posts

Adobe’s August 2025 Patch Tuesday Adobe’s August 2025 Patch Tuesday Cyber Security News
Securing Cloud Infrastructure – AWS, Azure, and GCP Best Practices Securing Cloud Infrastructure – AWS, Azure, and GCP Best Practices Cyber Security News
Google Chrome May Soon Turn Webpages Into Podcasts With AI Audio Overviews Google Chrome May Soon Turn Webpages Into Podcasts With AI Audio Overviews Cyber Security News
New Phishing Attack Leverages Popular Brands to Harvest Login Credentials New Phishing Attack Leverages Popular Brands to Harvest Login Credentials Cyber Security News
New PassiveNeuron Attacking Servers of High-Profile Organizations to Implant Malware New PassiveNeuron Attacking Servers of High-Profile Organizations to Implant Malware Cyber Security News
Threat Actors Weaponizing RMM Tools to Take Control of The Machine and Steal Data Threat Actors Weaponizing RMM Tools to Take Control of The Machine and Steal Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News