A banking Trojan targeting the Polish banks was found in Google Play

It has happened again, several banking Trojan samples have been found on Google Play, this time the malicious code targeted a number of Polish banks.

The malware was disguised as seemingly legitimate apps “Crypto Monitor”, a cryptocurrency price tracking app, and “StorySaver”, a third-party tool for downloading stories from Instagram.

The malicious code is able to display fake notifications and login forms on the infected device to harvest login credentials used to access legitimate banking applications. The code is also able to intercept SMS messages to bypass two-factor authentication used by the financial institutions.

The same malware was discovered by experts at security firm RiskIQ in November.

According to researchers from ESET, the “Crypto Monitor” app was uploaded to the Play store on November 25 by the developer walltestudio, while the “StorySaver” app was uploaded by the developer kirillsamsonov45 on November 29.

“Together, the apps had reached between 1000 and 5000 downloads at the time we reported them to Google on December 4. Both apps have since been removed from the store.” states the analysis published by ESET.

When the user launches the malicious apps, they compare the apps installed on the infected device against a list of fourteen apps used by Polish banks and once found one of them, the malicious code can display fake login forms imitating those of the targeted legitimate apps.

App namePackage name
Alior Mobilecom.comarch.mobile
BZWBK24 mobilepl.bzwbk.bzwbk24
Getin Mobilecom.getingroup.mobilebanking
IKOpl.pkobp.iko
Moje ING mobilepl.ing.mojeing
Bank Millenniumwit.android.bcpBankingApp.millenniumPL
mBank PLpl.mbank
BusinessPropl.bph
Nest Bankpl.fmbank.smart
Bank Pekaoeu.eleader.mobilebanking.pekao
PekaoBiznes24eu.eleader.mobilebanking.pekao.firm
plusbank24eu.eleader.mobilebanking.invest
Mobile Bankeu.eleader.mobilebanking.raiffeisen
Citi Handlowycom.konylabs.cbplpat

In some cases the fake login form is displayed to the user only after he clicks on a fake notification presented by the malware imitated the ones used by the targeted bank app.

“ESET’s security systems detect the threat as Android/Spy.Banker.QL and prevent it from getting installed.” states ESET.

“ESET telemetry shows that 96% of the detections come from Poland (the remaining 4% from Austria), apparently due to local social engineering campaigns propagating the malicious apps.” 

The experts noticed that it is very easy to remove the malicious apps by going to  Settings > (General) > Application manager/Apps, searching for the malicious apps and uninstalling them.

“To avoid falling prey to mobile malware in the future, make sure to always check app ratings and reviews, pay attention to what permissions you grant to apps, and use a reputable mobile security solution to detect and block latest threats.” concluded ESET.

ESET, who credited Witold Precikowski for the discovery, included the IoCs for this specific threat in its report.


Pierluigi Paganini

(Security Affairs – banking Trojan, malware)



The post A banking Trojan targeting the Polish banks was found in Google Play appeared first on Security Affairs.



Leave a Reply

A banking Trojan targeting the Polish banks was found in Google Play

It has happened again, several banking Trojan samples have been found on Google Play, this time the malicious code targeted a number of Polish banks.

The malware was disguised as seemingly legitimate apps “Crypto Monitor”, a cryptocurrency price tracking app, and “StorySaver”, a third-party tool for downloading stories from Instagram.

The malicious code is able to display fake notifications and login forms on the infected device to harvest login credentials used to access legitimate banking applications. The code is also able to intercept SMS messages to bypass two-factor authentication used by the financial institutions.

The same malware was discovered by experts at security firm RiskIQ in November.

According to researchers from ESET, the “Crypto Monitor” app was uploaded to the Play store on November 25 by the developer walltestudio, while the “StorySaver” app was uploaded by the developer kirillsamsonov45 on November 29.

“Together, the apps had reached between 1000 and 5000 downloads at the time we reported them to Google on December 4. Both apps have since been removed from the store.” states the analysis published by ESET.

When the user launches the malicious apps, they compare the apps installed on the infected device against a list of fourteen apps used by Polish banks and once found one of them, the malicious code can display fake login forms imitating those of the targeted legitimate apps.

App namePackage name
Alior Mobilecom.comarch.mobile
BZWBK24 mobilepl.bzwbk.bzwbk24
Getin Mobilecom.getingroup.mobilebanking
IKOpl.pkobp.iko
Moje ING mobilepl.ing.mojeing
Bank Millenniumwit.android.bcpBankingApp.millenniumPL
mBank PLpl.mbank
BusinessPropl.bph
Nest Bankpl.fmbank.smart
Bank Pekaoeu.eleader.mobilebanking.pekao
PekaoBiznes24eu.eleader.mobilebanking.pekao.firm
plusbank24eu.eleader.mobilebanking.invest
Mobile Bankeu.eleader.mobilebanking.raiffeisen
Citi Handlowycom.konylabs.cbplpat

In some cases the fake login form is displayed to the user only after he clicks on a fake notification presented by the malware imitated the ones used by the targeted bank app.

“ESET’s security systems detect the threat as Android/Spy.Banker.QL and prevent it from getting installed.” states ESET.

“ESET telemetry shows that 96% of the detections come from Poland (the remaining 4% from Austria), apparently due to local social engineering campaigns propagating the malicious apps.” 

The experts noticed that it is very easy to remove the malicious apps by going to  Settings > (General) > Application manager/Apps, searching for the malicious apps and uninstalling them.

“To avoid falling prey to mobile malware in the future, make sure to always check app ratings and reviews, pay attention to what permissions you grant to apps, and use a reputable mobile security solution to detect and block latest threats.” concluded ESET.

ESET, who credited Witold Precikowski for the discovery, included the IoCs for this specific threat in its report.


Pierluigi Paganini

(Security Affairs – banking Trojan, malware)



The post A banking Trojan targeting the Polish banks was found in Google Play appeared first on Security Affairs.



Leave a Reply

A banking Trojan targeting the Polish banks was found in Google Play

It has happened again, several banking Trojan samples have been found on Google Play, this time the malicious code targeted a number of Polish banks.

The malware was disguised as seemingly legitimate apps “Crypto Monitor”, a cryptocurrency price tracking app, and “StorySaver”, a third-party tool for downloading stories from Instagram.

The malicious code is able to display fake notifications and login forms on the infected device to harvest login credentials used to access legitimate banking applications. The code is also able to intercept SMS messages to bypass two-factor authentication used by the financial institutions.

The same malware was discovered by experts at security firm RiskIQ in November.

According to researchers from ESET, the “Crypto Monitor” app was uploaded to the Play store on November 25 by the developer walltestudio, while the “StorySaver” app was uploaded by the developer kirillsamsonov45 on November 29.

“Together, the apps had reached between 1000 and 5000 downloads at the time we reported them to Google on December 4. Both apps have since been removed from the store.” states the analysis published by ESET.

When the user launches the malicious apps, they compare the apps installed on the infected device against a list of fourteen apps used by Polish banks and once found one of them, the malicious code can display fake login forms imitating those of the targeted legitimate apps.

App namePackage name
Alior Mobilecom.comarch.mobile
BZWBK24 mobilepl.bzwbk.bzwbk24
Getin Mobilecom.getingroup.mobilebanking
IKOpl.pkobp.iko
Moje ING mobilepl.ing.mojeing
Bank Millenniumwit.android.bcpBankingApp.millenniumPL
mBank PLpl.mbank
BusinessPropl.bph
Nest Bankpl.fmbank.smart
Bank Pekaoeu.eleader.mobilebanking.pekao
PekaoBiznes24eu.eleader.mobilebanking.pekao.firm
plusbank24eu.eleader.mobilebanking.invest
Mobile Bankeu.eleader.mobilebanking.raiffeisen
Citi Handlowycom.konylabs.cbplpat

In some cases the fake login form is displayed to the user only after he clicks on a fake notification presented by the malware imitated the ones used by the targeted bank app.

“ESET’s security systems detect the threat as Android/Spy.Banker.QL and prevent it from getting installed.” states ESET.

“ESET telemetry shows that 96% of the detections come from Poland (the remaining 4% from Austria), apparently due to local social engineering campaigns propagating the malicious apps.” 

The experts noticed that it is very easy to remove the malicious apps by going to  Settings > (General) > Application manager/Apps, searching for the malicious apps and uninstalling them.

“To avoid falling prey to mobile malware in the future, make sure to always check app ratings and reviews, pay attention to what permissions you grant to apps, and use a reputable mobile security solution to detect and block latest threats.” concluded ESET.

ESET, who credited Witold Precikowski for the discovery, included the IoCs for this specific threat in its report.


Pierluigi Paganini

(Security Affairs – banking Trojan, malware)



The post A banking Trojan targeting the Polish banks was found in Google Play appeared first on Security Affairs.



Leave a Reply

A banking Trojan targeting the Polish banks was found in Google Play

It has happened again, several banking Trojan samples have been found on Google Play, this time the malicious code targeted a number of Polish banks.

The malware was disguised as seemingly legitimate apps “Crypto Monitor”, a cryptocurrency price tracking app, and “StorySaver”, a third-party tool for downloading stories from Instagram.

The malicious code is able to display fake notifications and login forms on the infected device to harvest login credentials used to access legitimate banking applications. The code is also able to intercept SMS messages to bypass two-factor authentication used by the financial institutions.

The same malware was discovered by experts at security firm RiskIQ in November.

According to researchers from ESET, the “Crypto Monitor” app was uploaded to the Play store on November 25 by the developer walltestudio, while the “StorySaver” app was uploaded by the developer kirillsamsonov45 on November 29.

“Together, the apps had reached between 1000 and 5000 downloads at the time we reported them to Google on December 4. Both apps have since been removed from the store.” states the analysis published by ESET.

When the user launches the malicious apps, they compare the apps installed on the infected device against a list of fourteen apps used by Polish banks and once found one of them, the malicious code can display fake login forms imitating those of the targeted legitimate apps.

App namePackage name
Alior Mobilecom.comarch.mobile
BZWBK24 mobilepl.bzwbk.bzwbk24
Getin Mobilecom.getingroup.mobilebanking
IKOpl.pkobp.iko
Moje ING mobilepl.ing.mojeing
Bank Millenniumwit.android.bcpBankingApp.millenniumPL
mBank PLpl.mbank
BusinessPropl.bph
Nest Bankpl.fmbank.smart
Bank Pekaoeu.eleader.mobilebanking.pekao
PekaoBiznes24eu.eleader.mobilebanking.pekao.firm
plusbank24eu.eleader.mobilebanking.invest
Mobile Bankeu.eleader.mobilebanking.raiffeisen
Citi Handlowycom.konylabs.cbplpat

In some cases the fake login form is displayed to the user only after he clicks on a fake notification presented by the malware imitated the ones used by the targeted bank app.

“ESET’s security systems detect the threat as Android/Spy.Banker.QL and prevent it from getting installed.” states ESET.

“ESET telemetry shows that 96% of the detections come from Poland (the remaining 4% from Austria), apparently due to local social engineering campaigns propagating the malicious apps.” 

The experts noticed that it is very easy to remove the malicious apps by going to  Settings > (General) > Application manager/Apps, searching for the malicious apps and uninstalling them.

“To avoid falling prey to mobile malware in the future, make sure to always check app ratings and reviews, pay attention to what permissions you grant to apps, and use a reputable mobile security solution to detect and block latest threats.” concluded ESET.

ESET, who credited Witold Precikowski for the discovery, included the IoCs for this specific threat in its report.


Pierluigi Paganini

(Security Affairs – banking Trojan, malware)



The post A banking Trojan targeting the Polish banks was found in Google Play appeared first on Security Affairs.



Leave a Reply

A banking Trojan targeting the Polish banks was found in Google Play

It has happened again, several banking Trojan samples have been found on Google Play, this time the malicious code targeted a number of Polish banks.

The malware was disguised as seemingly legitimate apps “Crypto Monitor”, a cryptocurrency price tracking app, and “StorySaver”, a third-party tool for downloading stories from Instagram.

The malicious code is able to display fake notifications and login forms on the infected device to harvest login credentials used to access legitimate banking applications. The code is also able to intercept SMS messages to bypass two-factor authentication used by the financial institutions.

The same malware was discovered by experts at security firm RiskIQ in November.

According to researchers from ESET, the “Crypto Monitor” app was uploaded to the Play store on November 25 by the developer walltestudio, while the “StorySaver” app was uploaded by the developer kirillsamsonov45 on November 29.

“Together, the apps had reached between 1000 and 5000 downloads at the time we reported them to Google on December 4. Both apps have since been removed from the store.” states the analysis published by ESET.

When the user launches the malicious apps, they compare the apps installed on the infected device against a list of fourteen apps used by Polish banks and once found one of them, the malicious code can display fake login forms imitating those of the targeted legitimate apps.

App namePackage name
Alior Mobilecom.comarch.mobile
BZWBK24 mobilepl.bzwbk.bzwbk24
Getin Mobilecom.getingroup.mobilebanking
IKOpl.pkobp.iko
Moje ING mobilepl.ing.mojeing
Bank Millenniumwit.android.bcpBankingApp.millenniumPL
mBank PLpl.mbank
BusinessPropl.bph
Nest Bankpl.fmbank.smart
Bank Pekaoeu.eleader.mobilebanking.pekao
PekaoBiznes24eu.eleader.mobilebanking.pekao.firm
plusbank24eu.eleader.mobilebanking.invest
Mobile Bankeu.eleader.mobilebanking.raiffeisen
Citi Handlowycom.konylabs.cbplpat

In some cases the fake login form is displayed to the user only after he clicks on a fake notification presented by the malware imitated the ones used by the targeted bank app.

“ESET’s security systems detect the threat as Android/Spy.Banker.QL and prevent it from getting installed.” states ESET.

“ESET telemetry shows that 96% of the detections come from Poland (the remaining 4% from Austria), apparently due to local social engineering campaigns propagating the malicious apps.” 

The experts noticed that it is very easy to remove the malicious apps by going to  Settings > (General) > Application manager/Apps, searching for the malicious apps and uninstalling them.

“To avoid falling prey to mobile malware in the future, make sure to always check app ratings and reviews, pay attention to what permissions you grant to apps, and use a reputable mobile security solution to detect and block latest threats.” concluded ESET.

ESET, who credited Witold Precikowski for the discovery, included the IoCs for this specific threat in its report.


Pierluigi Paganini

(Security Affairs – banking Trojan, malware)



The post A banking Trojan targeting the Polish banks was found in Google Play appeared first on Security Affairs.



Leave a Reply

A banking Trojan targeting the Polish banks was found in Google Play

It has happened again, several banking Trojan samples have been found on Google Play, this time the malicious code targeted a number of Polish banks.

The malware was disguised as seemingly legitimate apps “Crypto Monitor”, a cryptocurrency price tracking app, and “StorySaver”, a third-party tool for downloading stories from Instagram.

The malicious code is able to display fake notifications and login forms on the infected device to harvest login credentials used to access legitimate banking applications. The code is also able to intercept SMS messages to bypass two-factor authentication used by the financial institutions.

The same malware was discovered by experts at security firm RiskIQ in November.

According to researchers from ESET, the “Crypto Monitor” app was uploaded to the Play store on November 25 by the developer walltestudio, while the “StorySaver” app was uploaded by the developer kirillsamsonov45 on November 29.

“Together, the apps had reached between 1000 and 5000 downloads at the time we reported them to Google on December 4. Both apps have since been removed from the store.” states the analysis published by ESET.

When the user launches the malicious apps, they compare the apps installed on the infected device against a list of fourteen apps used by Polish banks and once found one of them, the malicious code can display fake login forms imitating those of the targeted legitimate apps.

App namePackage name
Alior Mobilecom.comarch.mobile
BZWBK24 mobilepl.bzwbk.bzwbk24
Getin Mobilecom.getingroup.mobilebanking
IKOpl.pkobp.iko
Moje ING mobilepl.ing.mojeing
Bank Millenniumwit.android.bcpBankingApp.millenniumPL
mBank PLpl.mbank
BusinessPropl.bph
Nest Bankpl.fmbank.smart
Bank Pekaoeu.eleader.mobilebanking.pekao
PekaoBiznes24eu.eleader.mobilebanking.pekao.firm
plusbank24eu.eleader.mobilebanking.invest
Mobile Bankeu.eleader.mobilebanking.raiffeisen
Citi Handlowycom.konylabs.cbplpat

In some cases the fake login form is displayed to the user only after he clicks on a fake notification presented by the malware imitated the ones used by the targeted bank app.

“ESET’s security systems detect the threat as Android/Spy.Banker.QL and prevent it from getting installed.” states ESET.

“ESET telemetry shows that 96% of the detections come from Poland (the remaining 4% from Austria), apparently due to local social engineering campaigns propagating the malicious apps.” 

The experts noticed that it is very easy to remove the malicious apps by going to  Settings > (General) > Application manager/Apps, searching for the malicious apps and uninstalling them.

“To avoid falling prey to mobile malware in the future, make sure to always check app ratings and reviews, pay attention to what permissions you grant to apps, and use a reputable mobile security solution to detect and block latest threats.” concluded ESET.

ESET, who credited Witold Precikowski for the discovery, included the IoCs for this specific threat in its report.


Pierluigi Paganini

(Security Affairs – banking Trojan, malware)



The post A banking Trojan targeting the Polish banks was found in Google Play appeared first on Security Affairs.



Leave a Reply

A banking Trojan targeting the Polish banks was found in Google Play

It has happened again, several banking Trojan samples have been found on Google Play, this time the malicious code targeted a number of Polish banks.

The malware was disguised as seemingly legitimate apps “Crypto Monitor”, a cryptocurrency price tracking app, and “StorySaver”, a third-party tool for downloading stories from Instagram.

The malicious code is able to display fake notifications and login forms on the infected device to harvest login credentials used to access legitimate banking applications. The code is also able to intercept SMS messages to bypass two-factor authentication used by the financial institutions.

The same malware was discovered by experts at security firm RiskIQ in November.

According to researchers from ESET, the “Crypto Monitor” app was uploaded to the Play store on November 25 by the developer walltestudio, while the “StorySaver” app was uploaded by the developer kirillsamsonov45 on November 29.

“Together, the apps had reached between 1000 and 5000 downloads at the time we reported them to Google on December 4. Both apps have since been removed from the store.” states the analysis published by ESET.

When the user launches the malicious apps, they compare the apps installed on the infected device against a list of fourteen apps used by Polish banks and once found one of them, the malicious code can display fake login forms imitating those of the targeted legitimate apps.

App namePackage name
Alior Mobilecom.comarch.mobile
BZWBK24 mobilepl.bzwbk.bzwbk24
Getin Mobilecom.getingroup.mobilebanking
IKOpl.pkobp.iko
Moje ING mobilepl.ing.mojeing
Bank Millenniumwit.android.bcpBankingApp.millenniumPL
mBank PLpl.mbank
BusinessPropl.bph
Nest Bankpl.fmbank.smart
Bank Pekaoeu.eleader.mobilebanking.pekao
PekaoBiznes24eu.eleader.mobilebanking.pekao.firm
plusbank24eu.eleader.mobilebanking.invest
Mobile Bankeu.eleader.mobilebanking.raiffeisen
Citi Handlowycom.konylabs.cbplpat

In some cases the fake login form is displayed to the user only after he clicks on a fake notification presented by the malware imitated the ones used by the targeted bank app.

“ESET’s security systems detect the threat as Android/Spy.Banker.QL and prevent it from getting installed.” states ESET.

“ESET telemetry shows that 96% of the detections come from Poland (the remaining 4% from Austria), apparently due to local social engineering campaigns propagating the malicious apps.” 

The experts noticed that it is very easy to remove the malicious apps by going to  Settings > (General) > Application manager/Apps, searching for the malicious apps and uninstalling them.

“To avoid falling prey to mobile malware in the future, make sure to always check app ratings and reviews, pay attention to what permissions you grant to apps, and use a reputable mobile security solution to detect and block latest threats.” concluded ESET.

ESET, who credited Witold Precikowski for the discovery, included the IoCs for this specific threat in its report.


Pierluigi Paganini

(Security Affairs – banking Trojan, malware)



The post A banking Trojan targeting the Polish banks was found in Google Play appeared first on Security Affairs.



Leave a Reply