Oscorp, a new Android malware stealing funds from the victims’ home banking service, by combining the usage of phishing kits and vishing calls. This new version of Oscorp malware was detected by Cleafy systems.
According to the report, the geographical distribution of banks and other apps targeted by Oscorp includes Spain, Poland, Germany, Turkey, the U.S., Italy, Japan, Australia, France, and India.
Main Features of Oscorp Malware
- Ability to send/intercept/delete SMS and make phone calls
- Ability to perform Overlay Attacks for more than 150 mobile applications
- VNC feature through WebRTC protocol and Android Accessibility Services
- Enabling key logging functionalities
Experts say once the malware is installed in the victim’s device, it enables Threat Actors to remotely connect to it via WebRTC protocol.
It is observed that threat actors leveraging on fake bank operators to convince victims over the phone while performing unauthorized bank transfers in the background. Also, these phishing campaigns were distributed via SMS messages (smishing), a common approach for retrieving valid credentials and phone numbers.
This new malware abuses the Android Accessibility services, a well-known technique used by the other families as well (e.g. Anubis, Cerberus/Alien, TeaBot, etc..).
It is being observed that on multiple hacking forums, a new Android botnet known as UBEL started being promoted. Multiple UBEL clients started accusing of scamming, as it appeared not to work on some specific Android devices.
The main link between Oscorp and UBEL, is the “bot id” string format, which consists of an initial “RZ-” substring followed by some random alphanumeric characters.
Once the malware is downloaded on the device, the malware attempts to install itself as a service and hide its presence from the target, thereby achieving persistence for extended periods.
Screenshots during the installation phase of OscorpTherefore, “The malware is distributed by the threat actors for gaining full remote access to the infected mobile device and performing unauthorized bank transfers from the infected device itself, drastically reducing their footprint since a new device enrollment is not required in this scenario”, state the experts from Cleafy systems.