{"id":168857,"date":"2024-09-25T06:11:50","date_gmt":"2024-09-25T06:11:50","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=168857"},"modified":"2024-09-25T06:11:52","modified_gmt":"2024-09-25T06:11:52","slug":"octo2-android-banking-trojan","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/168857\/malware\/octo2-android-banking-trojan.html","title":{"rendered":"New Android banking trojan Octo2 targets European banks"},"content":{"rendered":"
<\/div>\n

A new version of the Android banking trojan Octo, called Octo2, supports improved features that allow to takeover infected devices.<\/gwmw><\/h2>\n\n\n\n

ThreatFabric researchers discovered a new version of the Android banking trojan Octo, called Octo2, that supports more advanced remote action capabilities needed for Device Takeover attacks.<\/gwmw><\/p>\n\n\n\n

The new malware has already targeted users in European countries, including Italy, Poland, Moldova,\u00a0and\u00a0Hungary.<\/gwmw><\/p>\n\n\n\n

Octo2 is linked to the Exobot<\/a> malware, first identified in 2016, which also gave rise to another variant called Coper<\/a> in 2021.<\/gwmw><\/p>\n\n\n\n

In 2024, the Octo’s source code was leaked online, allowing other threat actors to create their own version. This leak likely prompted the original threat actor’s release of a new version, Octo2.<\/p>\n\n\n\n

\"Octo2<\/a><\/figure>\n\n\n\n

<\/gwmw>Over the years, Octo malware campaigns targeted regions worldwide, including Europe, the USA, Canada, the Middle East, Singapore, and Australia. Octo operates as Malware-as-a-Service, and its new version, Octo2, is being offered to existing users at the same price with early access. The researchers believe that many threat actors using Octo1 will switch to Octo2, expanding its global reach. Research indicates that Octo2 can block push notifications from specific apps, suggesting that cybercriminals are already targeting users of these apps as part of their attacks.<\/p>\n\n\n\n

“These samples from the first campaigns observed were masquerading as\u00a0Google Chrome, NordVPN,\u00a0and\u00a0\u201cEnterprise Europe Network\u201d\u00a0applications.” reads ThreatFabric’s report<\/a>. “However, as we said previously, we can expect threat actors behind Octo2 to not limit their activity and continue targeting users of mobile banking all over the world.”<\/em><\/p>\n\n\n\n

ThreatFabric observed Zombinder<\/a>\u00a0serving as the first stage of the installation in Octo2 campaigns they have monitored. Upon launch, Zombinder will request the installation of an additional \u201cplugin\u201d which is Octo2, thus successfully\u00a0bypassing Android 13+ restrictions<\/a>.<\/p>\n\n\n\n

Octo2 has been significantly improved, the authors enhanced stability during remote control sessions and improved its anti-detection and anti-analysis techniques. Key improvements include:<\/p>\n\n\n\n