Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label countries. Show all posts

Godfather Banking Trojan Multiplies, Spreading to 1.2K Variants in 57 Nations

 

Over a thousand variants of the Godfather mobile banking Trojan have been detected in numerous countries worldwide, targeting a wide array of banking applications.

Initially uncovered in 2022, Godfather has emerged as a pervasive malware-as-a-service tool in cybercrime circles, particularly within mobile cybercrime. 

According to Zimperium's 2023 "Mobile Banking Heists Report," Godfather had been focusing on 237 banking apps spanning across 57 countries as of late last year. Its operators redirected stolen financial data to at least nine countries, mainly in Europe and the US. To counteract potential disruptions from security software, the developers of Godfather have been automatically generating new variants for their clients at a remarkable pace.

This trend isn't limited to Godfather alone. Nico Chiaraviglio, Zimperium's chief scientist, warns of a broader escalation in mobile malware campaigns. He notes the emergence of a massive mobile malware family, still undisclosed, boasting over 100,000 distinct samples in circulation. This proliferation represents a significant shift in the mobile threat landscape, indicating a move towards more expansive and sophisticated attacks.

The surge in mobile malware diversity poses a considerable challenge for security measures, particularly those reliant on signature-based detection. Unlike desktop security, where antivirus software is widely adopted, mobile protection remains underutilized, leaving a substantial portion of devices vulnerable. With mobile threats rapidly evolving and diversifying, traditional antivirus programs struggle to keep pace due to the sheer volume and variation of malware samples.

Chiaraviglio suggests that adaptive security solutions, leveraging techniques like code reuse analysis and behavioral analysis powered by artificial intelligence (AI), offer promising avenues for combating this evolving threat landscape. 

By focusing on malware behavior rather than specific code signatures, these solutions can potentially mitigate the impact of constantly evolving malware variants. However, he acknowledges that this is an ongoing challenge, as threat actors continually adapt their tactics to evade detection, potentially leading to the rise of more sophisticated polymorphic malware in the mobile sphere.