UPDATED 18:38 EDT / DECEMBER 08 2022

SECURITY

‘Zombinder’ service allows cybercriminals to easily add malware to legitimate apps

A newly discovered service on the dark web has been found to allow cybercriminals to easily add malware to legitimate apps.

Detailed today by researchers at ThreatFabric B.V., “Zombinder” was discovered while researching several cases of threat actors using a form of Android banking malware known as Ermac. As the researchers dug further, they uncovered a campaign that employed several different types of malware targeting Android and Windows users, including Erbium, the Aurora stealer and Laplas “clipper.”

Campaigns using various forms of malware installed on Android apps are nothing new and are sadly all too familiar in 2022, but where the story gets interesting is that the researchers traced the campaign back to a third-party darknet service provider, which they dubbed Zombinder.

Advertising on the dark web as an application programming interface binding service, Zombinder launched in March 2022 and is now believed to be used by different threat actors. In an advertisement on a hacking forum, those behind the service pitch it as offering a universal binder that would allow malware to be bound with almost any legitimate application.

In its latest campaign, Zombinder has been distributing the Xenomorph banking malware under the guise of a VidMate application. Distribution involves the modified application being advertised and downloaded from a malicious website that mimics the original website of the application, with the victim tricked into visiting the site through malicious ads.

Varying from other malicious campaigns where apps don’t work, the Zombinder-infected application works as advertised. The victims remain unaware that they have also been infected by malware.

Although Android apps are the core focus of Zombinder, those behind the service also offer binding for Windows apps. Potential victims who download an infected Windows app also download the Erbium stealer, a popular form of Windows malware that steals saved passwords, credit card details, cookies and cryptocurrency wallet data.

“Android users can avoid Zombinder and similar malware by avoiding third-party app and APK download sites,” Paul Bischoff, privacy advocate with tech research company Comparitech Ltd., told SiliconANGLE. “Developers rarely upload their apps to these sites, so most of them are put there by third parties, likely without permission.”

Bischoff added that users should stick to Google Play or another official app store to help ensure they’re getting a legitimate version of the app. Similarly, users should not download an APK that someone sends them as a link or attachment in a message or email.

Image: ThreatFabric

A message from John Furrier, co-founder of SiliconANGLE:

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU