'BlackRock' Android Trojan Malware Can Steal Banking Credentials, Says CERT-In

CERT-In says the malware is deadly as it has the capability to "deflect" majority of antivirus applications.

Advertisement
By Press Trust of India | Updated: 30 July 2020 15:59 IST
Highlights
  • CERT-In has issued an advisory with respect to "BlackRock" malware
  • The Android malware was first spotted in May
  • CERT-In suggests counter-measures to Android users

The "BlackRock" Android malware is capable of stealing user credentials from apps

The country's cyber security agency has issued an alert against an Android malware, dubbed "BlackRock", that has the potential to "steal" banking and other confidential data of a user. It can extract credentials and credit card information from over 300 apps such as email, e-commerce apps, social media apps, besides banking and financial apps, the CERT-In said in an advisory.

The "attack campaign" of this 'Trojan' category malware is active globally, said the Computer Emergency Response Team of India (CERT-In), the national technology arm to combat cyber-attacks and guard Indian cyberspace. The BlackRock Android malware was initially reported by ThreatFabric earlier this month, and first spotted in May.

"It is reported that a new Android malware strain dubbed 'BlackRock' equipped with data-stealing capabilities is attacking a wide range of Android applications.

Advertisement

"The malware is developed using the source code of Xerxes banking malware which itself is a variant of LokiBot Android Trojan," the advisory said.

Advertisement

The "noteworthy feature" of this malware is that its target list contains 337 applications including banking and financial applications, and also non-financial and well-known commonly used brand name apps on an Android device that focus on social, communication, networking and dating platforms, it said.

"It can steal credentials and credit card information from over 300 plus apps like email clients, e-commerce apps, virtual currency, messaging or social media apps, entertainment apps, banking and financial apps etc," the advisory said.

Advertisement

The advisory described the infection activity of the malware.

"When the malware is launched on the victim's device, it hides its icon from app drawer and then masquerades itself as a fake Google update to request accessibility service privileges."

Advertisement

"Once this privilege is granted, it becomes free to grant itself additional permissions allowing it to function further without interacting with user," it said.

Threat operators can issue a number of commands for various operations such as logging keystrokes, spamming the victims'' contact lists with text messages, setting the malware as the default SMS manager, pushing system notifications to the C2 (command and control) server, locking the victim in the device home screen and steal and hide notifications, send spam and steal SMS messages and many more such activities, the advisory said.

The malware is deadly as it has the capability to "deflect" majority of antivirus applications.

"Another feature of this Android Trojan is making use of 'Android work profiles' to control the compromised device without requiring complete admin rights and instead creating and attributing its own managed profile to gain admin privileges," it said.

The federal cyber security agency suggested some counter-measures: do not download and install applications from untrusted sources and use reputed application market only; always review the app details, number of downloads, user reviews and check "additional information" section before downloading an app from play store, use device encryption or encrypt external SD card; avoid using unsecured, unknown Wi-Fi networks among others.

Also, when it comes to downloading banking apps one should use the official and verified version and users should make sure they have a strong AI-powered mobile anti-virus installed to detect and block this kind of tricky malware, the advisory said.


Is Redmi Note 9 the perfect successor to Redmi Note 8? We discussed this on Orbital, our weekly technology podcast, which you can subscribe to via Apple Podcasts, Google Podcasts, or RSS, download the episode, or just hit the play button below.

Affiliate links may be automatically generated - see our ethics statement for details.
 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Oppo Find X9 Series Price in India Leaked Again Ahead of Debut
  2. Oppo Reno 15 Series Launched With Up To 6,500mAh Battery: See Price, Features
  3. Vivo X300 and Teleconverter Kit India Prices Tipped Ahead of Launch
  4. Here's When the Nothing Phone 3a Lite Will Launch in India
  5. Mastiii 4 OTT Release Date Tipped Online: Know When and Where to Watch it Online?
  6. Landman Season 2 Now Streaming on JioHotstar: Everything You Need to Know
  1. Oppo Find X9 Series Launching Today: Know Price in India, Features, Specifications and More
  2. Astronomers Uncover the Vast Greater Pleiades Complex with 3,000 Hidden Stars
  3. Astronomers Capture First-Ever Early Snapshot of Supernova Shock Wave Using ESO’s VLT
  4. Artemis Era Raises Safety Concerns as Lunar Orbit Nears Capacity, New Study Finds
  5. SpaceX Sends Sentinel-6B to Orbit for Precision Sea-Level Tracking
  6. India Approves Chandrayaan-4 Moon Sample Mission and National Space Station
  7. Landman Season 2 Now Streaming on JioHotstar: Everything You Need to Know About This American Political Drama Series
  8. Nadu Center OTT Release Date: Know When to Watch This JioHotstar Specials Tamil Series Online
  9. Usiru OTT Release Date Revealed: Know Where to Watch This Kannada Thriller Online
  10. Boron Arsenide Surpasses Diamond in Heat Conductivity, Paving Way for Advanced Electronics
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.