Android users told to be on high alert after Cerberus banking Trojan leaks to the dark web

The full source code for the Cerberus banking malware has been released online after being leaked by one of its developers, cyber security company Kaspersky has found.

Kaspersky experts have been monitoring Cerberus since July 2020, although the Trojan virus was originally tracked in the summer of 2019.

In late February 2020, ThreatFabric researchers published a report claiming that Cerberus had been restructured and enhanced with RAT (Remote Access Trojan) abilities and was capable of stealing multi-factor authentication (2FA) tokens from Google Authenticator.

Although at the time Cerberus was still in its test phase, ThreatFabric warned users that the malware could be released “soon”.

Their predictions were proven right in late July, when the Cerberus source code went up for auction after the breakup of its development team.

Kaspersky researchers have found that one of the authors made the decision to publish the project source code on a popular Russian-speaking underground forum, most likely intending it to be accessed only by premium users.

However, cyber criminals are now able to acquire Cerberus for free, resulting in a rapid increase in cyber attacks on mobile banking in Russia as well as other European countries.

Kaspersky security researcher Dmitry Galov said that the “findings regarding Cerberus v2 are a warning to everyone implicated by Android security and Android banking security in particular”.

“We’re already seeing an increase in attacks on users since the source code was published. It’s not the first time we’ve seen something like this happen, but this boom of activity since the developers abandoned the project is the biggest developing story we’ve tracked for a while,” he added.

RELATED RESOURCE

Defence in depth: Closing the gaps in Microsoft 365 security

Exploring the security challenges facing organisations with a reliance on Microsoft 365

FREE DOWNLOAD

“We continue to investigate all found artefacts associated with the code, and will track related activity. But, in the meantime, the best form of defence that users can adopt involves aspects of security hygiene that they should be practicing already across their mobile devices and banking security.”

Kaspersky has warned Android users to only download and install applications from the Google Play store, as well as deactivate the function in smartphone settings for installing programmes from unknown sources.

Back in February, ThreatFabric reported that Cerberus was able to target communication applications such as Gmail, Outlook, and Telegram, as well as numerous banking applications, including Lloyds Bank Mobile Banking, Wells Fargo Mobile, and Santander.

Sabina Weston

Having only graduated from City University in 2019, Sabina has already demonstrated her abilities as a keen writer and effective journalist. Currently a content writer for Drapers, Sabina spent a number of years writing for ITPro, specialising in networking and telecommunications, as well as charting the efforts of technology companies to improve their inclusion and diversity strategies, a topic close to her heart.

Sabina has also held a number of editorial roles at Harper's Bazaar, Cube Collective, and HighClouds.