Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Android Malware Mimics as SBI Card, Axis Bank Apps to Steal Users Financial Data

Posted on August 5, 2025August 5, 2025 By CWS

A complicated new Android malware marketing campaign has emerged focusing on Indian banking prospects by convincing impersonations of common monetary purposes.

The malicious software program masquerades as reputable apps from main Indian monetary establishments, together with SBI Card, Axis Financial institution, Indusind Financial institution, ICICI, and Kotak, deceiving customers into downloading pretend purposes that steal delicate monetary data.

The malware operates by rigorously crafted phishing web sites that carefully replicate official banking portals, incorporating genuine visible components and branding to ascertain credibility.

Phishing web site (Supply – McAfee)

These fraudulent websites characteristic distinguished “Get App” and “Obtain” buttons that immediate unsuspecting customers to put in malicious APK information disguised as official banking purposes.

The marketing campaign particularly targets Hindi-speaking customers throughout India, leveraging cultural and linguistic familiarity to reinforce its misleading effectiveness.

McAfee researchers recognized this risk as significantly harmful resulting from its dual-purpose structure that mixes conventional banking fraud with cryptocurrency mining capabilities.

The malware not solely harvests private and monetary knowledge but in addition silently mines Monero cryptocurrency on contaminated units, maximizing the attackers’ monetary features from every compromised gadget.

What distinguishes this marketing campaign from standard banking trojans is its subtle evasion mechanisms and distant activation capabilities.

Upon set up, the malware presents customers with a pretend Google Play Retailer interface suggesting an app replace is required.

Preliminary display screen proven by the dropper app (Supply – McAfee)

This misleading tactic builds consumer confidence whereas the malware prepares its malicious payload.

Superior Payload Supply and Execution Mechanism

The malware employs a complicated two-stage payload supply system designed to evade static evaluation and detection.

Initially functioning as a dropper, the applying shops an encrypted DEX file inside its belongings folder, which serves because the first-stage loader part.

This encrypted payload is obfuscated utilizing XOR encryption, stopping rapid detection by safety scanners.

The primary-stage loader decrypts and dynamically hundreds a second encrypted file containing the precise malicious payload.

This layered method ensures that no clearly malicious code seems in the principle APK file, complicating forensic evaluation and automatic detection methods.

Pretend card verification display screen (Supply – McAfee)

As soon as the ultimate payload executes, it presents victims with convincing pretend banking interfaces that seize delicate data together with card numbers, CVV codes, and private particulars.

The cryptocurrency mining performance operates by Firebase Cloud Messaging, permitting attackers to remotely set off mining operations utilizing XMRig software program.

The malware downloads encrypted mining binaries from hardcoded URLs and executes them utilizing ProcessBuilder, producing Monero cryptocurrency whereas remaining largely undetected on contaminated units.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Strive 50 Free Trial Searches

Cyber Security News Tags:Android, Apps, Axis, Bank, Card, Data, Financial, Malware, Mimics, SBI, Steal, Users

Post navigation

Previous Post: NVIDIA Triton Vulnerability Chain Let Attackers Take Over AI Server Control
Next Post: 15,000 Fake TikTok Shop Domains Deliver Malware, Steal Crypto via AI-Driven Scam Campaign

Related Posts

Cloudflare Accuses Perplexity AI For Evading Firewalls and Crawling Websites by Changing User Agent Cyber Security News
United Natural Foods Suffers Cyberattack Cyber Security News
New Sophisticated Attack Bypasses Content Security Policy Using HTML-Injection Technique Cyber Security News
Jenkins Gatling Plugin Vulnerability Let Attackers Bypass Content-Security-Policy Protection Cyber Security News
Multiple Apache Tomcat Vulnerabilities Let Attackers Trigger DoS Attacks Cyber Security News
Signal App Clone TeleMessage Vulnerability May Leak Passwords; Hackers Exploiting It Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft’s Project Ire Autonomously Reverse Engineers Software to Find Malware
  • Cloudflare Accuses Perplexity AI For Evading Firewalls and Crawling Websites by Changing User Agent
  • Google’s August Patch Fixes Two Qualcomm Vulnerabilities Exploited in the Wild
  • APT36 Hackers Attacking Indian Government Entities to Steal Login Credentials
  • Cisco Says User Data Stolen in CRM Hack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft’s Project Ire Autonomously Reverse Engineers Software to Find Malware
  • Cloudflare Accuses Perplexity AI For Evading Firewalls and Crawling Websites by Changing User Agent
  • Google’s August Patch Fixes Two Qualcomm Vulnerabilities Exploited in the Wild
  • APT36 Hackers Attacking Indian Government Entities to Steal Login Credentials
  • Cisco Says User Data Stolen in CRM Hack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News