Android/SpyNote Moves to Crypto Currencies

Affected Platform: AndroidImpacted Users: Android users with mobile crypto wallet or banking applicationsImpact: Financial LossSeverity Level: Medium.
It has grown into one of the most common families of malware for Android, with multiple samples, integration of other RATs, and a large family of over 10,000 samples.
On February 1st, we found a malicious sample posing as a legitimate crypto wallet that actually included the SpyNote RAT with several interesting additions related to anti-analysis and cryptocurrencies.
Like much Android malware today, this malware abuses the Accessibility API. This API is used to automatically perform UI actions.
The malicious sample uses the Accessibility API to record device unlocking gestures.
Newer, this SpyNote sample uses the Accessibility API to target famous crypto wallets.
The following code recognizes the use of a legitimate crypto wallet and displays an overlay over it.
For the malware analyst, it's obvious they are fake.
It is likely the victim won't notice because the wallet identifiers always have many characters and are therefore difficult to verify, and this will look as if it were displayed by the victim's legit crypto wallet application.
The malicious code uses the Accessibility API to automatically fill a form and transfer a given amount of cryptocurrency to the cybercriminals.
Reads and memorizes the destination wallet address Reads and memorizes the amount Modifies the destination address and replaces it with the attacker's crypto wallet address.
All of these operations are performed automatically through the Accessibility API without the user's intervention.
Permissions for the Accessibility API. To gain access to the Accessibility API, all malware lure victims one way or another into giving them the necessary rights.
While the Accessibility API is rightfully requested by apps to help people with disabilities, they should always be treated as highly suspicious coming from alleged crypto wallets, PDF Readers, Video Players, etc.
The 2 screenshots below show the SpyNote malware requesting Accessibility Service and how, when you grant the desired access, the Android OS displays an additional warning window explaining the risks.
Besides injections into crypto wallets, the sample features an interesting, simple, but efficient anti-analysis technique.
After a growing interest in financial institutions, this new Android/SpyNote sample shows that malware authors are now taking into account cryptocurrencies.
The capabilities of the malware are well beyond the mere spying of credentials as they can initiate cryptocurrency transfers.
As for anti-analysis, while the implemented technique is simple and by-passable by a human analyst, it certainly defeats-or complicates-automated analysis, giving the malware author a little more time before detection.
The sample is detected automatically by our products, and we urge Android users to pay particular attention to any application requesting the Accessibility API. Fortinet Protections.


This Cyber News was published on feeds.fortinet.com. Publication date: Thu, 15 Feb 2024 16:43:04 +0000


Cyber News related to Android/SpyNote Moves to Crypto Currencies

Android/SpyNote Moves to Crypto Currencies - Affected Platform: AndroidImpacted Users: Android users with mobile crypto wallet or banking applicationsImpact: Financial LossSeverity Level: Medium. It has grown into one of the most common families of malware for Android, with multiple samples, ...
2 years ago Feeds.fortinet.com
SpyNote Android malware spreads via fake volcano eruption alerts - The Android 'SpyNote' malware was observed in attacks targeting Italy using a fake 'IT-alert' public alert service that infected visitors with the information-stealing malware. IT-alert is a legitimate public service operated by the Italian ...
2 years ago Bleepingcomputer.com Rocke
CVE-2025-12194 - Uncontrolled Resource Consumption vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS bc-fips on All (API modules), Legion of the Bouncy Castle Inc. Bouncy Castle for Java LTS bcprov-lts8on on All (API modules) allows ...
4 months ago
Hackers Mimic Google Chrome Install Page on Google Play to Deploy Android Malware - Security researchers have uncovered a sophisticated malware campaign targeting Android users through fake Google Chrome installation pages. The visual similarity to legitimate Google Play pages creates a convincing illusion that tricks unsuspecting ...
10 months ago Cybersecuritynews.com OilRig APT3
Feds Seize 'Sinbad' Crypto Mixer Used by North Korea's Lazarus - In its continued efforts to crack down on North Korea's most formidable state-sponsored threat group, the US government has seized a virtual currency mixer that has been serving as the principal way the group launders money stolen from its ...
2 years ago Darkreading.com Lazarus Group
The Week in Ransomware - January 20th, 2023 Crypto Exchanges Under Attack - The week of January 20th, 2023 brought yet another wave of ransomware attacks targeting crypto exchanges. Crypto exchanges all around the world have been hit by a barrage of sophisticated and well-planned ransomware campaigns. From high-profile ...
3 years ago Bleepingcomputer.com
CVE-2022-50231 - In the Linux kernel, the following vulnerability has been resolved: ...
8 months ago
Bloomberg Crypto X account snafu leads to Discord phishing attack - The official Twitter account for Bloomberg Crypto was used earlier today to redirect users to a deceptive website that stole Discord credentials in a phishing attack. As first spotted by crypto fraud investigator ZachXBT, the profile contained a link ...
2 years ago Bleepingcomputer.com Scattered Spider
Web3 security firm CertiK's X account hacked to push crypto drainer - The Twitter/X account of blockchain security firm CertiK was hijacked today to redirect the company's more than 343,000 followers to a malicious website pushing a cryptocurrency wallet drainer. Crypto fraud sleuth ZachXBT later leaked screenshots of ...
2 years ago Bleepingcomputer.com
Netgear, Hyundai latest X accounts hacked to push crypto drainers - The official Netgear and Hyundai MEA Twitter/X accounts are the latest hijacked to push scams designed to infect potential victims with cryptocurrency wallet drainer malware. While Hyundai has already regained access to their account and has cleaned ...
2 years ago Bleepingcomputer.com
What Is Android System WebView and Should You Uninstall It? | Definition from TechTarget - Android developers use WebView when they want to display webpages or Hypertext Markup Language content in a Google app or other application. Android System WebView is a system component for the Android operating system (OS) that enables Android apps ...
1 year ago Techtarget.com
CVE-2025-38052 - In the Linux kernel, the following vulnerability has been resolved: ...
8 months ago
North Korean Hackers Stole $600m in Crypto in 2023 - North Korean hackers stole at least $600m in cryptocurrency in 2023, around a third of the total value of such heists, according to blockchain intelligence firm TRM. Despite the eye-watering sum, this figure represents a 30% reduction on ...
2 years ago Infosecurity-magazine.com
France threatens to block crypto licence passporting in EU regulatory fight - Reuters - France has issued a stern warning to the European Union regarding the passporting of crypto licenses, signaling a potential regulatory standoff set for 2025. The French government is concerned about the risks posed by the current EU framework that ...
5 months ago Reuters.com
Canadian Financial Intelligence Agency Predicts Crypto Crime to Surge Rapidly - As the use of cryptocurrency grows, more criminals are likely to start using it to raise, move, and conceal money outside of the established banking system, according to Canada's financial intelligence agency. In a report published on Monday, the ...
2 years ago Cysecurity.news
Massive Data Breach at Gokumarket: Over a Million Users' Information Exposed - Several days before the leak, the GokuMarket team found an unprotected MongoDB instance, which was storing information about its users, namely those who bought and sold crypto on the exchange. In GokuMarket's case, it is the details of more than a ...
2 years ago Cysecurity.news
CVE-2025-38488 - In the Linux kernel, the following vulnerability has been resolved: ...
7 months ago
Best Platform To Catch Up on Crypto News? - That is why crypto publications such as InsideBitcoins.com are getting a lot of traction. These guides give a complete analysis of new and old cryptocurrencies through multiple perspectives. Crypto price predictions are where InsideBitcoins.com's ...
2 years ago Hackread.com
X users fed up with constant stream of malicious crypto ads - Cybercriminals are abusing X advertisements to promote websites that lead to crypto drainers, fake airdrops, and other scams. Like all advertising platforms, X, formerly known as Twitter, claims to show advertisements based on a user's activity, ...
2 years ago Bleepingcomputer.com
Analyzing the SonicWall Custom Grub LUKS Encryption Modifications - During our initial analysis of a virtual machine image for the application, we discovered a customized LUKS encryption mechanism meant to hinder reverse engineering of the application. We were able to recover the LUKS decryption key by leveraging ...
2 years ago Securityboulevard.com
9 arrested in Europe in crypto platform takedown - European authorities have arrested nine individuals linked to a major crypto platform takedown operation. This coordinated law enforcement action targeted a crypto platform involved in illicit activities, highlighting the increasing scrutiny on ...
3 months ago Therecord.media
The 20 Most Essential Crypto Bug Bounty Programs - Working with cryptocurrency has become more and more popular in the last few years, but it’s not without risks. It’s important for sites that conduct digital payments and transfers to have security measures in place to help keep your data safe ...
3 years ago Hackread.com Hunters
Crypto wallet founder loses $125,000 to fake airdrop website - A crypto wallet service co-founder shares with the world his agony after losing $125,000 to a crypto scam. The startup CEO, who at the time believed he was on a legitimate cryptocurrency airdrop website, realized after his loss that the domain he'd ...
2 years ago Bleepingcomputer.com
Mandiant's X account hacked by crypto Drainer-as-a-Service gang - The threat actor who took over Mandiant's X social media account used it to share links, redirecting the company's over 123,000 followers to a phishing page to steal cryptocurrency. As Mandiant found during a follow-up investigation into the ...
2 years ago Bleepingcomputer.com
SEC Approves Bitcoin ETFs, Crypto Industry Rejoices - The US securities regulator has officially approved the first US-listed exchange traded funds to track bitcoin, in what is being labelled a watershed moment for the world's largest cryptocurrency, as well as the broader crypto industry. Earlier this ...
2 years ago Silicon.co.uk Rocke