New Android malware wipes your device after draining bank accounts

Share:

A new Android malware that researchers call ‘BingoMod’ can wipe devices after successfully stealing money from the victims’ bank accounts using the on-device fraud technique.

Promoted through text messages, the malware poses as a legitimate mobile security tool and can steal up to 15,000 EUR per transaction.

According to researchers analyzing it, BingoMod is currently under active development, with its author focusing on adding code obfuscation and various evasion mechanisms to drop detection rate.

BingoMod details

Researchers at Cleafy, an online fraud management and prevention solution, found that BingoMod is distributed in smishing (SMS phishing) campaigns and uses various names that typically indicate a mobile security tool (e.g. APP Protection, Antivirus Cleanup, Chrome Update, InfoWeb, SicurezzaWeb, WebSecurity, WebsInfo, WebInfo, and APKAppScudo).

In one instance, the malware uses the icon for the free AVG AntiVirus & Security tool available on Google Play.

During the installation routine, the malware requests permission to use Accessibility Services, which provides advanced features that allow extensive control of the device.

Once active, BingoMod steals any login credentials, takes screenshots, and intercepts SMS messages.

To perform on-device fraud (ODF), the malware establishes a socket-based channel to receive commands and an HTTP-based channel to send a feed of screenshots, enabling almost real-time remote operation.

ODF is a common technique used for initiating fraudulent transactions from the victim’s device, which fools standard anti-fraud systems that rely on identity verification and authentication.

Cleafy researchers explain in a report today that “the VNC routine abuses Android’s Media Projection API to obtain real-time screen content. Once received, this is transformed into a suitable format and transmitted via HTTP to the TAs’ [threat actor’s] infrastructure.”

One feature of the routine is that it can leverage Accessibility Services “to impersonate the user and enable the screen-casting request, exposed by the Media Projection API.”

The commands that the remote operators can send to BingoMod include clicking on a particular area, writing text on a specified input element, and launching an application.

The malware also allows manual overlay attacks through fake notifications initiated by the threat actor. Additionally, a device infected with BingoMod could also be used to further spread the malware through SMS.

Disabling defenses and wiping data

BingoMod can remove security solutions from the victim’s device or block activity of apps that the threat actor specifies in a command.

To evade detection, the malware’s creators have added code-flattening and string obfuscation layers, which, based on scan results on VirusTotal, achieved the intended goal.

If the malware is registered on the device as a device admin app, the operator can send a remote command to wipe the system. According to the researchers, this function is executed only after a successful transfer and impacts only the external storage.

For a complete wipe, it is possible that the threat actor uses the remote access capability to erase all data and reset the phone from the system settings.

Although BingoMod is currently at version 1.5.1, Cleafy says that it appears to be in an early development stage.

Based on the comments in the code, the researchers believe that BingoMod may be the work of a Romanian developer. However, it is also possible that developers from other countries are contributing.

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
1:13 pm, Jan 21, 2025
weather icon 5°C
L: 4° | H: 7°
broken clouds
Humidity: 88 %
Pressure: 1014 mb
Wind: 7 mph ESE
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 75%
Rain Chance: 0%
Visibility: 8 km
Sunrise: 7:53 am
Sunset: 4:29 pm
DailyHourly
Daily ForecastHourly Forecast
Today 9:00 pm
weather icon
4° | 7°°C 0 mm 0% 3 mph 93 % 1014 mb 0 mm/h
Tomorrow 9:00 pm
weather icon
4° | 4°°C 1 mm 100% 5 mph 97 % 1009 mb 0 mm/h
Thu Jan 23 9:00 pm
weather icon
3° | 7°°C 1 mm 100% 16 mph 88 % 1006 mb 0 mm/h
Fri Jan 24 9:00 pm
weather icon
6° | 11°°C 1 mm 100% 24 mph 92 % 1005 mb 0 mm/h
Sat Jan 25 9:00 pm
weather icon
3° | 7°°C 0.2 mm 20% 9 mph 81 % 1015 mb 0 mm/h
Today 3:00 pm
weather icon
5° | 6°°C 0 mm 0% 3 mph 83 % 1014 mb 0 mm/h
Today 6:00 pm
weather icon
4° | 4°°C 0 mm 0% 3 mph 85 % 1013 mb 0 mm/h
Today 9:00 pm
weather icon
4° | 4°°C 0 mm 0% 3 mph 93 % 1010 mb 0 mm/h
Tomorrow 12:00 am
weather icon
4° | 4°°C 0 mm 0% 3 mph 96 % 1009 mb 0 mm/h
Tomorrow 3:00 am
weather icon
4° | 4°°C 0 mm 0% 3 mph 97 % 1006 mb 0 mm/h
Tomorrow 6:00 am
weather icon
4° | 4°°C 1 mm 100% 3 mph 97 % 1005 mb 0 mm/h
Tomorrow 9:00 am
weather icon
4° | 4°°C 1 mm 100% 3 mph 97 % 1004 mb 0 mm/h
Tomorrow 12:00 pm
weather icon
4° | 4°°C 1 mm 100% 4 mph 94 % 1003 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€100,585.25
-2.47%
Ethereum(ETH)
€3,183.31
-0.19%
XRP(XRP)
€3.01
-4.02%
Tether(USDT)
€0.96
0.02%
Solana(SOL)
€232.06
-5.05%
Dogecoin(DOGE)
€0.366221
2.39%
USDC(USDC)
€0.97
0.01%
Shiba Inu(SHIB)
€0.000020
-1.25%
Pepe(PEPE)
€0.000014
-5.34%
Peanut the Squirrel(PNUT)
€0.362172
-6.14%
Scroll to Top