Despite source code leak, Android malware fetches top $5,000 price

Symantec says the iBanking malware is stealing one-time passcodes for banking applications

A malware program for Android called iBanking is still selling for a top price despite the leak of its source code in February by a hacker named ReVOLVeR, who also compromised the BBC.

A malware program for Android called iBanking is still selling for a top price despite the leak of its source code in February by a hacker named ReVOLVeR, who also compromised the BBC.

Despite a leak of its source code, an Android program aimed at compromising online bank accounts is still commanding US$5,000 per copy, one of the highest prices seen for a type of malware, according to research from Symantec.

Symantec and RSA published details on their blogs on Tuesday about iBanking, which is being used by two Eastern European cybercrime groups to intercept one-time SMS passcodes used for logging into bank accounts.

IBanking is notable for its wide range of features and defensive measures that thwart analysis by security researchers. It can steal just about any information on an Android device, record calls or forward calls to another phone, Symantec wrote.

The malware often appears in Android app marketplaces as a legitimate banking application. It appears victims who are targeted already have a separate type of malware installed on a desktop system, which prompts them to enter their phone number after navigating to their bank's website.

Then, an SMS code with a link to iBanking is sent to their phone. It alternatively displays a QR code that also leads victims to the malware, Symantec wrote.

Two gangs, which Symantec called the Neverquest crew and Zerafik, have used iBanking, with Zerafik targeting customers of the financial institution ING, Symantec wrote. In that case, iBanking was modified to appear to look like an official application from ING.

RSA found that iBanking's code is scrambled in a way to make it harder for malware experts to study, using techniques that have been seen on desktop-based malicious software but not widely on mobile malware.

IBanking sells for around $5,000 or for a cut of the proceeds from theft it facilitates, Symantec wrote. IBanking's source code was leaked in February after a hacker nicknamed "ReVOLVeR" found it while avenging a friend's loss of 65,000 bitcoins that were pilfered by the malware, Symantec wrote.

In the course of that quest, ReVOLVeR, believed to be Russian, also came across FTP login credentials for a server belonging to the broadcaster BBC, which he tried to sell.

IBanking's price should have dropped after its source code was released. But iBanking's developer, who is someone going by the nickname "GFF," has continued to develop it and provide support, which has sustained its marketability.

"Despite the availability of a free version, our research suggests that most of the large cybercrime actors are continuing to opt for the paid-for version," Symantec wrote. "They appear to be willing to pay a premium for the updates and support provided by GFF."

RSA wrote that its analysis of iBanking showed that it will shut itself down if it detects it is running in a virtual machine. Virtual machines are often used by malware analysts to study the behavior of an application.

Trying to halt analysts and security professionals "has been a standard among PC malware developers for quite a while but is far from standard practice in the mobile malware field," RSA wrote.

"The iBanking malware shows that mobile malware developers are becoming aware of the necessity to protect their bots against analysis and indicates a possible new trend in this new and evolving mobile malware space," the company wrote.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags symantecsecuritymobilersamalware

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service
Show Comments

Cool Tech

SanDisk MicroSDXC™ for Nintendo® Switch™

Learn more >

Breitling Superocean Heritage Chronographe 44

Learn more >

Toys for Boys

Family Friendly

Panasonic 4K UHD Blu-Ray Player and Full HD Recorder with Netflix - UBT1GL-K

Learn more >

Stocking Stuffer

Razer DeathAdder Expert Ergonomic Gaming Mouse

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Walid Mikhael

Brother QL-820NWB Professional Label Printer

It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?