Android users told to be on high alert after Cerberus banking Trojan leaks to the dark web
The source code for the authenticator-breaking malware is available for free on underground forums
Kaspersky experts have been monitoring Cerberus since July 2020, although the Trojan virus was originally tracked in the summer of 2019.
In late February 2020, ThreatFabric researchers published a report claiming that Cerberus had been restructured and enhanced with RAT (Remote Access Trojan) abilities and was capable of stealing multi-factor authentication (2FA) tokens from Google Authenticator.
Although at the time Cerberus was still in its test phase, ThreatFabric warned users that the malware could be released “soon”.
Their predictions were proven right in late July, when the Cerberus source code went up for auction after the breakup of its development team.
Kaspersky researchers have found that one of the authors made the decision to publish the project source code on a popular Russian-speaking underground forum, most likely intending it to be accessed only by premium users.
However, cyber criminals are now able to acquire Cerberus for free, resulting in a rapid increase in cyber attacks on mobile banking in Russia as well as other European countries.
Kaspersky security researcher Dmitry Galov said that the “findings regarding Cerberus v2 are a warning to everyone implicated by Android security and Android banking security in particular”.
“We’re already seeing an increase in attacks on users since the source code was published. It’s not the first time we’ve seen something like this happen, but this boom of activity since the developers abandoned the project is the biggest developing story we’ve tracked for a while,” he added.
Defence in depth: Closing the gaps in Microsoft 365 security
Exploring the security challenges facing organisations with a reliance on Microsoft 365Download now
“We continue to investigate all found artefacts associated with the code, and will track related activity. But, in the meantime, the best form of defence that users can adopt involves aspects of security hygiene that they should be practicing already across their mobile devices and banking security.”
Kaspersky has warned Android users to only download and install applications from the Google Play store, as well as deactivate the function in smartphone settings for installing programmes from unknown sources.
Back in February, ThreatFabric reported that Cerberus was able to target communication applications such as Gmail, Outlook, and Telegram, as well as numerous banking applications, including Lloyds Bank Mobile Banking, Wells Fargo Mobile, and Santander.
Managing security risk and compliance in a challenging landscape
How key technology partners grow with your organisationDownload now
Evaluate your order-to-cash process
15 recommended metrics to benchmark your O2C operationsDownload now
AI 360: Hold, fold, or double down?
How AI can benefit your businessDownload now
Getting started with Azure Red Hat OpenShift
A developer’s guide to improving application building and deployment capabilitiesDownload now