This new Android malware is draining bank accounts across the world – here’s what you need to know


A new malware campaign on Android has been discovered stealing people’s personally identifiable information (PII) and banking data, and in some cases, even stealing money from their bank accounts.
As per a report by security expert Pol Thill, a threat actor known as Neo_Net has been targeting bank users worldwide since June 2021, focusing mostly on victims in Spain and Chile. Among the banks whose clients are being targeted are Santander, BBVA, CaixaBank, Deutsche Bank, Crédit Agricole, and ING.
The attacker, who seems to be located in Mexico, did two things: ran a data-harvesting phishing campaign, and distributed Android malware designed to steal multi-factor authentication (MFA) codes.
According to the researchers, the attacker created convincingly-looking landing pages, which could easily be mistaken for authentic websites belonging to the abovementioned banks. Then, they’d run a SMSishing campaign, urging the victims to click on the link and leave their identity data which the attackers would harvest using a Telegram bot.
“The phishing pages were meticulously set up using Neo_Net’s panels, PRIV8, and implemented multiple defense measures, including blocking requests from non-mobile user agents and concealing the pages from bots and network scanners,” the researcher said in his writeup.
In some cases, the attackers would also trick victims into downloading malicious Android apps that pretend to be security software but are, in fact, just there to steal MFA codes. Upon installation, the apps request SMS permissions.
Analysis: Why does it matter?
There are two important takeaways from this malicious campaign: one – it’s highly successful, and two – it seems to be deploying a proprietary SMSishing platform called Ankarex.
“Despite using relatively unsophisticated tools, Neo_Net has achieved a high success rate by tailoring their infrastructure to specific targets, resulting in the theft of over 350,000 EUR from victims’ bank accounts and compromising Personally Identifiable Information (PII) of thousands of victims,” Thill said in his analysis of the campaign.
The actual sum is probably a lot bigger than that, SentinelOne added in its report, as older operations, and transactions that don’t require multi-factor authentication were not added to the total sum.
This specific campaign has been active between June 2021 and April 2023, the researcher said, suggesting that the threat actor was probably active for a lot longer. He’s described as a “seasoned cybercriminal” that not only runs malicious campaigns but also sells tools and services on the dark net. Among other things, Neo_Net was observed selling phishing planets, compromised victim data, and the smishing-as-a-service tool called Ankarex.
It’s this Ankarex platform that was recently used in this campaign, the report suggests, as it was apparently active since May 2022. At the moment it’s being actively promoted on Neo_Net’s Telegram channel which boasts some 1,700 subscribers.
“The service itself is accessible at ankarex[.]net, and once registered, users can upload funds using cryptocurrency transfers and launch their own Smishing campaigns by specifying the SMS content and target phone numbers,” Thill said.
Despite the fact that the threat actor seems to be focusing almost exclusively on the Spanish-speaking community, the campaign still casts a relatively wide net. The researcher states that Neo_Net attacked clients of 50 financial institutions, 30 of which were headquartered either in Spain, or Chile. The full list of affected banks can be found on this link.
What have others said about the malicious campaign?
In their writeup, SentinelOne calls Neo_Net the “Kingpin of Spanish e-crime”. The publication states the threat actor maintains a public GitHub profile under the name “notsafety”, as well as a Telegram account where he presents his work. It’s also here where the hacker claims he’s the founder of Ankarex. Cybersecurity news reports that the sensitive data the hacker stole included telephone numbers, national identity numbers, and names of thousands of victims. Social networks have been unusually quiet about the report, with visitors on both Reddit and Twitter deciding not to comment on the news.
Banking Trojans are a common occurrence in the world of cybercrime. Just a week ago, researchers discovered the Anatsa banking trojan as being behind multiple confirmed cases of fraud. Anatsa was being distributed via Android apps sold on the Google Play Store, ThreatFabric reported at the time. The apps had more than 30,000 installations and targeted almost 600 financial applications from around the world.
They targeted victims in the US, Germany, Austria, and Switzerland. Anatsa was first discovered back in 2020.
Furthermore, as customers typically have their guard up when it comes to online banking, many of the malware droppers identified by the cybersecurity researchers have posed as PDF viewers. Having informed the Play Store of its findings, ThreatFabric found Google quick to react, but the threat actors just as quick to republish apps of a similar nature.
Go deeper
If you want to learn more about staying safe online, make sure to check out our guide for the best antivirus programs out there, as well as best endpoint protection tools. You should also read up on the best firewalls, as well as the best ID theft protection software right now.
Via: The Hacker News
A new malware campaign on Android has been discovered stealing people’s personally identifiable information (PII) and banking data, and in some cases, even stealing money from their bank accounts. As per a report by security expert Pol Thill, a threat actor known as Neo_Net has been targeting bank users worldwide…
Recent Posts
- The newly announced PSVR 2 price cut might finally make it a viable Meta Quest 3 competitor
- Hoto’s 48-in-1 electric screwdriver set hits a record low $70
- Amazon says its new quantum computing chip will make error correction more efficient
- I think Microsoft is smart to follow OpenAI in making these premium features free
- Pokémon Presents 2025: all the biggest news and trailers
Archives
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010