Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Android Malware Mimics as SBI Card, Axis Bank Apps to Steal Users Financial Data

Posted on August 5, 2025August 5, 2025 By CWS

A complicated new Android malware marketing campaign has emerged focusing on Indian banking prospects by convincing impersonations of common monetary purposes.

The malicious software program masquerades as reputable apps from main Indian monetary establishments, together with SBI Card, Axis Financial institution, Indusind Financial institution, ICICI, and Kotak, deceiving customers into downloading pretend purposes that steal delicate monetary data.

The malware operates by rigorously crafted phishing web sites that carefully replicate official banking portals, incorporating genuine visible components and branding to ascertain credibility.

Phishing web site (Supply – McAfee)

These fraudulent websites characteristic distinguished “Get App” and “Obtain” buttons that immediate unsuspecting customers to put in malicious APK information disguised as official banking purposes.

The marketing campaign particularly targets Hindi-speaking customers throughout India, leveraging cultural and linguistic familiarity to reinforce its misleading effectiveness.

McAfee researchers recognized this risk as significantly harmful resulting from its dual-purpose structure that mixes conventional banking fraud with cryptocurrency mining capabilities.

The malware not solely harvests private and monetary knowledge but in addition silently mines Monero cryptocurrency on contaminated units, maximizing the attackers’ monetary features from every compromised gadget.

What distinguishes this marketing campaign from standard banking trojans is its subtle evasion mechanisms and distant activation capabilities.

Upon set up, the malware presents customers with a pretend Google Play Retailer interface suggesting an app replace is required.

Preliminary display screen proven by the dropper app (Supply – McAfee)

This misleading tactic builds consumer confidence whereas the malware prepares its malicious payload.

Superior Payload Supply and Execution Mechanism

The malware employs a complicated two-stage payload supply system designed to evade static evaluation and detection.

Initially functioning as a dropper, the applying shops an encrypted DEX file inside its belongings folder, which serves because the first-stage loader part.

This encrypted payload is obfuscated utilizing XOR encryption, stopping rapid detection by safety scanners.

The primary-stage loader decrypts and dynamically hundreds a second encrypted file containing the precise malicious payload.

This layered method ensures that no clearly malicious code seems in the principle APK file, complicating forensic evaluation and automatic detection methods.

Pretend card verification display screen (Supply – McAfee)

As soon as the ultimate payload executes, it presents victims with convincing pretend banking interfaces that seize delicate data together with card numbers, CVV codes, and private particulars.

The cryptocurrency mining performance operates by Firebase Cloud Messaging, permitting attackers to remotely set off mining operations utilizing XMRig software program.

The malware downloads encrypted mining binaries from hardcoded URLs and executes them utilizing ProcessBuilder, producing Monero cryptocurrency whereas remaining largely undetected on contaminated units.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Strive 50 Free Trial Searches

Cyber Security News Tags:Android, Apps, Axis, Bank, Card, Data, Financial, Malware, Mimics, SBI, Steal, Users

Post navigation

Previous Post: NVIDIA Triton Vulnerability Chain Let Attackers Take Over AI Server Control
Next Post: 15,000 Fake TikTok Shop Domains Deliver Malware, Steal Crypto via AI-Driven Scam Campaign

Related Posts

First-ever AI-powered ‘MalTerminal’ Malware uses OpenAI GPT-4 to Generate Ransomware Code Cyber Security News
Threat Actors Using Multilingual ZIP File to Attack Financial and Goverment Organizations Cyber Security News
iOS 26 Deletes Pegasus and Predator Spyware Infection Evidence by Overwriting The ‘shutdown.log’ file on Reboot Cyber Security News
Gcore Mitigates Record-Breaking 6 Tbps DDoS Attack Cyber Security News
New BRICKSTORM Stealthy Backdoor Attacking Tech and Legal Sectors Cyber Security News
How to Enrich Alerts with Live Attack Data from 15K SOCs  Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Jupyter Misconfiguration Flaw Allow Attackers to Escalate Privileges as Root User
  • US Sanctions North Korean Bankers Accused of Laundering Stolen Cryptocurrency
  • CISA Warns of CWP Vulnerability Exploited in the Wild
  • CISA Adds Gladinet and CWP Flaws to KEV Catalog Amid Active Exploitation Evidence
  • HydraPWK Penetration Testing OS With Necessary Hacking Tools and Simplified Interface

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Jupyter Misconfiguration Flaw Allow Attackers to Escalate Privileges as Root User
  • US Sanctions North Korean Bankers Accused of Laundering Stolen Cryptocurrency
  • CISA Warns of CWP Vulnerability Exploited in the Wild
  • CISA Adds Gladinet and CWP Flaws to KEV Catalog Amid Active Exploitation Evidence
  • HydraPWK Penetration Testing OS With Necessary Hacking Tools and Simplified Interface

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News