The Android banking trojan known as
SpyNote has been dissected to reveal its diverse information-gathering features.
Typically spread via SMS phishing campaigns, attack chains involving the spyware trick potential victims into installing the app by clicking on the embedded link, according to F-Secure.
Besides requesting invasive permissions to access call logs, camera, SMS messages, and external storage, SpyNote is known for hiding its presence from the Android home screen and the
Recents screen in a bid to make it difficult to avoid detection.
"The SpyNote malware app can be launched via an external trigger," F-Secure researcher Amit Tambe
said in an analysis published last week. "Upon receiving the intent, the malware app launches the main activity."