Android malware uses VNC to give attackers hands-on access

Android malware uses VNC to give attackers hands-on access

A new Android banking and remote access trojan named Klopatra has infected over 3,000 devices in Europe, disguising itself as an IPTV and VPN app. The sophisticated malware employs anti-debugging, VNC mode, and stealth tactics to steal banking credentials, exfiltrate data, and control infected devices remotely. #Klopatra #TurkishThreatActor

Keypoints

  • Klopatra is a highly evasive Android trojan targeting banking and cryptocurrency apps.
  • The malware is distributed via a dropper app outside the Google Play Store, called β€œModpro IP TV + VPN.”
  • It uses anti-debugging, emulator detection, and encrypts code to prevent reverse-engineering.
  • Klopatra exploits Accessibility services for permission grants and to monitor user activity.
  • There are ongoing operations by a Turkish-speaking cybercrime group with over 3,000 known infections.

Read More: https://www.bleepingcomputer.com/news/security/android-malware-uses-vnc-to-give-attackers-hands-on-access/