Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Cyber Criminals go after Users of Brazil’s #1 Banking Online Payment service: PIX

September 2021 by Check Point

Check Point Research (CPR) detected cyber attacks against the users of PIX, the instant payment solution created and managed by the Brazilian Central Bank. The attackers distributed two different variants of banking malware, named PixStealer and MalRhino, through two separate malicious applications on Google’s Play Store to carry out their attacks. Both malicious applications were designed to steal money of victims through user interaction and the original PIX application.

PIX is considered the number one payment solution in Brazil, processing over 40 million transactions a day and moving 4.7 billion dollars a week.

PixStealer Funnels Entire Account Balances to Attacker Accounts

The first variant is dubbed PixStealer. Presented in what CPR calls a “slim” form, the attackers designed PixStealer with only one capability: transfer a victim’s funds to an actor-controlled account. PixStealer’s “slim” presentation is a reference to the variant’s ability to operate without connection to a command and control (C&C) server, fostering ability to go undetected. CPR ultimately found PixStealer being distributed on Google’s Play Store as a fake PagBank Cashback service, targeting only the Brazilian PagBank.

When a user opens their PIX bank application, Pixstealer shows the victim an overlay window, where user can’t see the attacker’s moves. Behind the overlay window, the attacker retrieves the available amount of money and transfers the money, often the entire account balance, to another account.

MalRhino Hijacks Banking Applications Entirely

CPR went onto find a more advanced banking malware variant, capable of hijacking the entire PIX mobile application and other bank applications. Dubbed MalRhino, CPR found the more advanced malware variant in a fake iToken app for Brazilian Inter Bank – also distributed via Google’s Play Store. MalRhino displays a message to its victim attempting to convince them to grant Accessibility permission. Once granted, MalRhino can:
 Collect the installed application and send the list to the C&C server together with the victim’s device info
 Run banks applications
 Retrieve pin from the Nubank application

Lotem Finkelsteen, Head of Threat Intelligence at Check Point Software Technologies:
“We live in a time where cyber criminals do not need to hack a bank to steal money. All a cybercriminal needs to do is understand the platforms that banks use and their respective pitfalls. There’s a growing trend where cyber criminals are going after the applications of institutional banks. This time, we found cyber attacks against the users of Brazil’s number one banking application. The attack involved two malicious apps, that at some point could be found on Google Play Store, but no longer. The attackers presented a slim version, which ran an overlay when using the legit application, and a full blown version that has capabilities to hijacking the entire banking application, eventually. We believe these cyber attacks to be a strong sign that cyber criminals are trending their activities around android banking malware, with the goal to transfer funds of victims to their own accounts. In a world where everything is done remotely due to coronavirus, We recommend users remove the malicious apps from their mobile phones immediately. I also strongly urge all users of bank applications to watch out for banking malware laced into mobile applications. CPR will continue to monitor the latest technological trends and how cyber criminals are taking advantage of them.”


See previous articles

    

See next articles












Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts