Chameleon Android Banking Trojan Strikes Again: New Version Disables Biometrics to Steal PINs

by | Dec 21, 2023 | News

Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes
The Chameleon Android banking trojan has resurfaced with a new iteration that employs a cunning method to compromise devices by disabling fingerprint and face unlock features in order to pilfer device PINs.
 
This latest version of Chameleon, as reported by researchers at ThreatFabric, has been observed to utilize an HTML page trick to gain access to the Accessibility service and disrupt biometric operations, thereby enabling the theft of PINs and unrestricted access to the device.
 
Previous iterations of Chameleon, identified earlier this year, masqueraded as Australian government agencies, banks, and the CoinSpot cryptocurrency exchange, carrying out a range of malicious activities such as keylogging, overlay injection, cookie theft, and SMS theft on compromised devices.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses

Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

According to ThreatFabric, the current distribution of this malware is facilitated through the Zombinder service, where it poses as Google Chrome. Zombinder is known for attaching malware to legitimate Android apps, allowing the malicious code to operate surreptitiously in the background while the victim uses the intended app.
 
Chameleon-carrying APKs posing as Google ChromeChameleon-carrying APKs posing as Google Chrome (ThreatFabric)
 

New variant features

One of the new features of this latest Chameleon variant is its ability to display an HTML page on devices running Android 13 and later, coercing users to grant the app permission to use the Accessibility service. This is particularly concerning as Android 13 and later versions are equipped with a security feature called “Restricted setting,” designed to block the approval of potentially hazardous permissions like Accessibility.
 
Chameleon's HTML page trickChameleon’s HTML page prompt (ThreatFabric)
 
Furthermore, the new Chameleon variant can interrupt biometric operations on the device, such as fingerprint and face unlock, by leveraging the Accessibility service to compel a fallback to PIN or password authentication. This enables the malware to capture PINs and passwords entered by the victim, granting it unrestricted access to the device for clandestine malicious activities.
 
Java code snippet disrupting the biometric serviceJava code snippet disrupting the biometric service on Android (ThreatFabric)



ThreatFabric also notes that Chameleon has incorporated task scheduling through the AlarmManager API, allowing it to manage periods of activity and define the type of activity based on the status of the Accessibility service.
 
In light of these developments, ThreatFabric cautions that the new Chameleon variant represents a more sophisticated and adaptable threat in the constantly evolving landscape of mobile banking trojans.
 
To safeguard against the Chameleon threat, it is advised to refrain from obtaining APKs (Android package files) from unofficial sources, as these are the primary distribution channels for the Zombinder service. Additionally, users are urged to ensure that Play Protect is enabled at all times and to conduct regular scans to ensure their devices are free from malware and adware.

Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?

If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This