Chameleon Android malware disables biometric unlock to steal PINs
Bill Toulas
- December 21, 2023
- 05:00 AM
- 0
The Chameleon Android banking trojan has re-emerged with a new version that uses a tricky technique to take over devices — disable fingerprint and face unlock to steal device PINs.
It does this by using an HTML page trick to acquire access to the Accessibility service and a method to disrupt biometric operations to steal PINs and unlock the device at will.
Earlier versions of Chameleon spotted in April this year impersonated Australian government agencies, banks, and the CoinSpot cryptocurrency exchange, performing keylogging, overlay injection, cookie theft, and SMS theft on compromised devices.
Researchers at ThreatFabric, who have been following the malware, report that it is currently distributed via the Zombinder service, posing as Google Chrome.
Zombinder "glues" malware to legitimate Android apps so that victims can enjoy the full functionality of the app they intended to install, making it less likely to suspect that dangerous code is running in the background.
The platform claims its malicious bundles are undetectable in runtime, bypassing Google Protect alerts and evading any anti-virus products running on the infected device.
New Chameleon features
Android 13 and later are protected by a security feature called "Restricted setting," which blocks the approval of dangerous permissions like Accessibility, which malware can leverage to steal on-screen content, grant itself additional permissions, and perform navigation gestures.
When Chameleon detects Android 13 or 14 upon launch, it loads an HTML page that guides the user through a manual process to enable Accessibility for the app, bypassing the system's protection.
The malware captures any PINs and passwords the victim enters to unlock their device and can later use them to unlock the device at will to perform malicious activities hidden from view.
Depending on whether Accessibility is enabled or disabled, the malware adapts to launching overlay attacks or performing app usage data collection to decide on the best moment for injection.
"These enhancements elevate the sophistication and adaptability of the new Chameleon variant, making it a more potent threat in the ever-evolving landscape of mobile banking trojans," warns ThreatFabric.
Additionally, ensure that Play Protect is enabled at all times, and run regular scans to ensure your device is clean of malware and adware.
___________________________________________________________________________________
No comments:
Post a Comment