Android users told to be on high alert after Cerberus banking Trojan leaks to the dark web
The source code for the authenticator-breaking malware is available for free on underground forums
Kaspersky experts have been monitoring Cerberus since July 2020, although the Trojan virus was originally tracked in the summer of 2019.
In late February 2020, ThreatFabric researchers published a report claiming that Cerberus had been restructured and enhanced with RAT (Remote Access Trojan) abilities and was capable of stealing multi-factor authentication (2FA) tokens from Google Authenticator.
Although at the time Cerberus was still in its test phase, ThreatFabric warned users that the malware could be released “soon”.
Their predictions were proven right in late July, when the Cerberus source code went up for auction after the breakup of its development team.
Kaspersky researchers have found that one of the authors made the decision to publish the project source code on a popular Russian-speaking underground forum, most likely intending it to be accessed only by premium users.
However, cyber criminals are now able to acquire Cerberus for free, resulting in a rapid increase in cyber attacks on mobile banking in Russia as well as other European countries.
Kaspersky security researcher Dmitry Galov said that the “findings regarding Cerberus v2 are a warning to everyone implicated by Android security and Android banking security in particular”.
“We’re already seeing an increase in attacks on users since the source code was published. It’s not the first time we’ve seen something like this happen, but this boom of activity since the developers abandoned the project is the biggest developing story we’ve tracked for a while,” he added.
Defence in depth: Closing the gaps in Microsoft 365 security
Exploring the security challenges facing organisations with a reliance on Microsoft 365Download now
“We continue to investigate all found artefacts associated with the code, and will track related activity. But, in the meantime, the best form of defence that users can adopt involves aspects of security hygiene that they should be practicing already across their mobile devices and banking security.”
Kaspersky has warned Android users to only download and install applications from the Google Play store, as well as deactivate the function in smartphone settings for installing programmes from unknown sources.
Back in February, ThreatFabric reported that Cerberus was able to target communication applications such as Gmail, Outlook, and Telegram, as well as numerous banking applications, including Lloyds Bank Mobile Banking, Wells Fargo Mobile, and Santander.
Choosing a collaboration platform
Eight questions every IT leader should askDownload now
Performance benchmark: PostgreSQL/ MongoDB
Helping developers choose a databaseDownload now
Customer service vs. customer experience
Three-step guide to modern customer experienceDownload now
Taking a proactive approach to cyber security
A complete guide to penetration testingDownload now