BeatBanker Malware Targets Crypto Wallets With Audio‑Based Persistence

BeatBanker Malware Targets Crypto Wallets With Audio‑Based Persistence
BeatBanker Malware Targets Crypto Wallets With Audio‑Based Persistence
In a recent discovery, the BeatBanker malware campaign has been uncovered, using a unique method to maintain persistence on Android devices.

This malware, which primarily targets users in Brazil, not only steals banking credentials but also hijacks cryptocurrency transactions and runs a crypto miner in the background.

What makes BeatBanker particularly concerning is its use of an audio loop to evade detection, keeping it active on the infected device for extended periods.

Social Engineering and The First Stage Of Infection

The BeatBanker attack starts with a social engineering trick. Attackers create a fake website that closely mimics the Google Play Store, luring the victim to download a malicious app disguised as INSS Reembolso, a trusted Brazilian government app.

The fake app prompts users to grant installation permissions, leading them to download the malware onto their devices unknowingly.

The malicious APK contains a shared library (libludwwiuh.so) that decrypts another ELF file, which then loads the DEX file. This method allows the malware to execute without being stored on the file system, avoiding detection by traditional antivirus software.

According to SecureList, the malware uses a Java Native Interface (JNI) to continue execution, bypassing mobile security products.

BeatBanker Targets Crypto Wallets (Source: securelist)
BeatBanker Targets Crypto Wallets (Source: securelist)

Once executed, the malware displays a Google Play Store-like interface, tricking the victim into thinking the INSS Reembolso app needs an update.

The user is led to click on an “Update” button, which then silently downloads the cryptocurrency miner payload. This payload, an XMRig miner, connects to a mining pool to mine Monero cryptocurrency, draining the victim’s device’s resources and battery.

BeatBanker Targets Crypto Wallets (Source: securelist)
BeatBanker Targets Crypto Wallets (Source: securelist)

Persistence Through Audio Loop

The malware employs an innovative persistence technique: it plays a near-inaudible audio file on a loop. This loop prevents the operating system from terminating the malicious process, as the device thinks it is playing media.

This tactic ensures that the malware remains active on the victim’s device even when the system goes idle. The audio file is only five seconds long. It contains Chinese words, making it difficult to detect through normal user behavior.

BeatBanker Targets Crypto Wallets (Source: securelist)
BeatBanker Targets Crypto Wallets (Source: securelist)

To protect against BeatBanker and other similar threats, it is critical to:

  1. Only download apps from trusted sources: Stick to the official Google Play Store and verify developer credentials.
  2. Review app permissions: Be cautious of apps requesting extensive permissions, especially those related to accessibility and installing third-party APKs.
  3. Keep devices and apps updated: Regular security updates help protect against known vulnerabilities.

This sophisticated malware campaign is an example of how attackers are constantly innovating their techniques, using new tools and strategies to evade detection.

Organizations and Securelist individuals must stay vigilant and implement robust security measures to protect sensitive financial and personal data from these evolving threats.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post BeatBanker Malware Targets Crypto Wallets With Audio‑Based Persistence appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Leave a Reply

Your email address will not be published. Required fields are marked *

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading