Hackers Breached MDM Servers to Install Banking Malware on Android Devices
May 5, 2020 Share

Hackers Breached MDM Servers to Install Banking Malware on Android Devices

Hackers Breached MDM Servers to Install Banking Malware on Android Devices

Security researchers uncovered that hackers had breached at least 75% of the MDM (Mobile Device Manager) server to install banking malware on Android devices in wide.

MDM is also recognized as EMM (Enterprise Mobility Management); it is a mechanism that is generally used by most of the companies. The company who register for enterprise-owned projects with the corresponding command server to get it more comfortable to accomplish tasks such as addressing company-wide device arrangements, disposing applications, and many more.

But, this recent conflict has now infected across 75% of the company’s devices globally. After installing it, this dangerous Cerberus variant can accumulate huge amounts of delicate data, that comprises users’ private data, and transfer it to a remote command and control (C&C) server.

Cerberus is a banking trojan, and it was initially spotted in June 2019. It simply uses a Malware-as-a-Service (MaaS) business model and allowing the clients who borrow their services to lower their payloads. And not only that, even they also allow the attackers to configure and control the devices that are compromised during their attacks.

HTML popup to steal user’s Gmail credentials.

Factory Reset all registered Devices

After getting access to the company server, which is the MDM, the hackers then start deploying the application, and after that, they managed to breach nearly 75% of companies’ Android devices.

When two malicious apps got installed on a vast number on the company’s devices within a short time, the researchers got curious, and they started to detect the conflict with the help of the breached MDM server.

Here’s what the researchers at Check Point have stated, “This is the first time we have a reported incident of mobile malware distribution that uses the MDM server as an attack vector.”

Moreover, the security researchers at Check Point has also concluded that to get rid of this malware and the ability of the attacker to control the infected Android devices, companies should immediately factory reset all the Android devices registered with the compromised MDM server.

MDM
payload module can receive from the C&C

Securing Access to Compromised Devices

Well, Cerberus simply ensures access to the compromised devices just by preventing the victims’ efforts to uninstall the TeamViewer app.

Apart from this, it obtains admin rights, and simply retard the users to uninstall any apps it requires to execute its ill-disposed tasks and it goes the same with the malware as it simply blocks any users who are trying to remove the app.

MDM
Popup window asking the user to update Accessibility Service.

Moreover, the Cerberus also deactivates the built-in Android malware security system, Google Play Protect, simply by exploiting the Accessibility Service mainly on compromised Android devices as it prevents automatic removal and detection.

MDM

“Managing this type of device implies installing the application, configuring settings, and implementing different types of policies on various devices at a time,” security researchers said.

We can state that this conflict illustrates the significance of knowing the variation between managing and securing mobile devices.

Whereas MDM contributes an accessible method to handle those devices, and more importantly, the security cannot be neglected. But, the conflict of this type happened for the first time, and now people will understand the necessity of managing and securing the devices.

So, what do you think about this? Simply share all your views and thoughts in the comment section below.

Indicators of Compromise

C2 Server – 91.210.169[.]114

Package Name Application Name sha256
com.wjnjrmigikmpher.efaunxm Google Play 1.0 4254670ea5f353263570792a8ff4a1e6ea35999c2454fa1ec040786d7be33b69
com.dfxsdgr.qvoor Google 1.0 6291192d0c2
f6318f9a4f345203b35cfe140be53889f9fefdd8e057a4f02e898
com.sakkkwyl.ncceberwpdhfq GTA V 1.0 3ef8349d4b717d73d31366dfbe941470e749222331edd0b9484955a212080ad8

 

This post Hackers Breached MDM Servers to Install Banking Malware on Android Devices originally appeared on GB Hackers.

Read More