Site icon Check Point Blog

Clever and Persistent Android Banking Trojan Discovered

A new Android banking trojan that specializes in stealing information by intercepting specific SMS messages has been discovered in the wild. Although still without an official name, the malware is being circulated under the name 888.apk. Below is our rundown of the threat as well several conclusions from our research team.

What exactly is 888.apk?

888.apk is an mRAT (Mobile Remote Access Trojan) which primarily steals banking details, but also performs several secondary forms of malicious activity:

888.apk is targeting Android users in China at the moment. That being said, banking establishments in many different countries use authentication systems that would be vulnerable to this type of attack. mTAN (Mobile Two Factor Authentication) collectors that specifically aim to collect data that will enable attackers to bypass the two-factor authentication used in many countries are undoubtedly a threat to be reckoned with.

From a CISO’s perspective, what happens if a device becomes infected?

888.apk is definitely not the easiest threat to deal with:

Are Lacoon customers protected?

Yes. If this mRAT attempts to infect a device protected by Lacoon Mobile Security, Lacoon will be able to identify its activity and alert the victim and the organization.

Exit mobile version