Security News Sneaky Gugi banking trojan sidesteps Android OS security barricades

Solarquest

Moderator
Thread author
Verified
Staff Member
Malware Hunter
Well-known
Jul 22, 2014
2,525
Overlay malware gets angry if you try and say no

Gugi, a bank-account-raiding trojan for smartphones, has been retooled to bypass Android 6's security features designed to block phishing attempts and ransomware infections.

The modified malware forces users into giving it the ability to overlay genuine apps, send and view SMSes, make calls, and more. The software nasty is distributed through social engineering, usually with a spam SMS that encourages users to click on a malicious link.

The Gugi trojan is geared toward stealing users' mobile banking credentials by overlaying their genuine banking applications with counterfeit apps. The malware also attempts to seize credit card details using much the same trick of overlaying the Google Play Store app with hacker-controlled code.

Android OS version 6 was launched late last year with security features designed specifically to block such attacks. Among other things, apps now need the user's permission to overlay other apps, and to request approval for actions such as sending SMS messages and making calls.

Modifications of the Gugi trojan allow the malicious code to circumvent these two security controls.

Once installed on the device, the trojan sets about getting the access rights it requires. When ready, the malware displays the following sign on the user's screen: "Additional rights needed to work with graphics and windows." There is only one button: "Provide."

Users are subsequently presented with a screen asking them to authorize app overlay. After receiving this permission, the trojan blocks the device screen with a message asking for "Trojan Device Administrator" rights, before asking for permission to send and view SMS messages and to make calls. If the trojan does not receive all the permissions it needs, it completely blocks the infected device.

More on how the Gugi Android trojan bypasses elements of Android 6 security can be found on the Securelist.com blog here.

The Gugi banking trojan has been known about since December 2015, with the modified mobile malware first hitting the radar screens of security researchers in June 2016.

The vast majority (93 per cent) of users attacked by the Gugi trojan are based in Russia. Between April and early August 2016 there was a ten-fold increase in its number of victims, according to security researchers at Kaspersky Lab. ®
 

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
With all pop-ups came from Android 6 security features, only a foolish people will not ever understand hence equal bypass.

Clearly the program will not execute without user interaction but rather undergone verification which you cannot be infect easily.
 

davidp

Level 1
Verified
Aug 16, 2016
26
Wondering who spent time with it before June 2016 if it wasn't the security researchers...
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top