Researchers from F5 Labs have recently unveiled a new Android banking trojan dubbed MaliBot. The primary goal of MaliBot is to steal e-banking service credentials, crypto wallet passwords, and other personal data. Different delivery methods for the malware have been seen in the wild, and at this time they are all still active. The first method being used includes fake websites that advertise malicious crypto apps where the user has to manually download the app. The second delivery method is a site that pushes a crypto app called MiningX, which seems legitimate, but if the QR code is scanned, MaliBot is loaded to the victim device. The threat actors behind Malibot have also been using smishing (SMS phishing) as a method of attempting to infect devices. The Command and Control (C2) server linked to the malware traces back to Russia, and the IP associated with it has been involved with other campaigns in the past. Additional analysis by the researchers at F5 uncovered features that have not yet been implemented. This is an unfortunate sign that means there will likely be new versions of the malware in the future.
Using Microsoft Sentinel to Detect Confluence CVE-2022-26134 Exploitation
By Akshay Rohatgi and Randy Pargman About this Student Research Project Binary Defense’s mission is