A new Android banking trojan named SOVA (“owl” in Russian) is under active development, researchers said, and it has big dreams even in its infancy stage. The malware is looking to incorporate distributed denial of service (DDoS), man in the middle (MiTM) and ransomware functionality into its arsenal – on top of existing banking overlay, notification manipulation and keylogging services.
The malware appeared in August with an ambitious roadmap (think ransomware, DDoS) that could make it ‘the most feature-rich Android malware on the market.’
According to researchers from ThreatFabric, the malware’s authors are shooting for the moon on this one.
“This malware is still in its infancy and it is undergoing a testing phase…prospecting serious and worrying plans for the near future,” they said in a Friday analysis, noting that the malware’s roadmap is laid out in underground forum posts advertising its availability for testing.
“SOVA is…taking a page out of traditional desktop malware,” they added. “Including DDoS, man in the middle and ransomware to its arsenal could mean incredible damage to end users, in addition to the already very dangerous threat that overlay and keylogging attacks serve.”
The malware authors’ coding and development choices also speak to SOVA’s sophistication, the analysis showed.
“Regarding the development, SOVA also stands out for being fully developed in Kotlin, a coding language supported by Android and thought by many to be the future of Android development,” according to ThreatFabric. “If the author’s promises on future features are kept, SOVA could potentially be the most complete and advanced Android bot to be fully developed in Kotlin to this day.”
SOVA meanwhile relies on the legitimate open-source project known as RetroFit for its communication with the command-and-control (C2) server.
“Retrofit is a type-safe REST client for Android, Java and Kotlin developed by Square,” researchers said. “The library provides a powerful framework for authenticating and interacting with APIs and sending network requests with OkHttp.” Banking Trojan Features
SOVA is first and foremost a banking trojan, and its authors are applying innovation to this portion of its development too, researchers noted. For instance, SOVA doesn’t skimp on the more traditional banking front of overlay attacks.
Overlay attacks are a common tactic used by banking trojans, in which the malware replaces the screen that users see when they log into mobile banking with a copycat screen – thus harvesting any credentials the victim puts in. In SOVA’s case, the targets that it’s capable of imitating include banking applications, cryptocurrency wallets and shopping applications that require credit-card access to operate.
“According to the authors, there are already multiple overlays available for different banking institutions from the U.S. and Spain, but they offer the possibility of creating more in case of necessity from the buyer,” researchers noted. Also, version 2 contains functionality to target users of some Russian banks – drawing ire from other forum users, ThreatFabric reported. To better gather the victim’s credentials and other personally identifiable information (PII), SOVA is banking (so to speak) on Android’s Accessibility Services – also a traditional functionality.
“When it is started for the first time, the malware hides its app icon and abuses the Accessibility Services to obtain all the necessary permissions to operate properly,” researchers explained. Some of those permissions allow it to intercept for SMS messages and notifications for instance, to better hide from the victim – and on the roadmap is also the ability to circumvent two-factor authentication. SOVA already has one highly uncommon banking-trojan feature that stands out for Android malware, according to the analysis: The ability to steal session cookies, which allows the malware to piggyback on valid logged-in banking sessions, thus skirting the need to have banking credentials to access victim’s accounts.
“Cookies are a vital part of web functionality, which allow users to maintain open sessions on their browsers without having to re-input their credentials repeatedly,” researchers noted. “SOVA will create a WebView to open a legitimate web URL for the target application and steal the cookies once the victim successfully logs in…it is capable of stealing session cookies from major websites like Gmail or PayPal with ease.” In the newer version of SOVA, the cybercrooks also added the option to create a list of applications for which to monitor for cookies automatically.
The News Highlights
- SOVA, a Dangerously Sophisticated Android Trojan, Takes to the Air
- Check the latest update on Security news
For Latest News Follow us on Google News
- Show all
- Trending News
- Popular By week