


It doesn’t target every potential victim it encounters, but only select ones, using the geofencing feature to identify and ignore users from China, India, Romania, Russia, Ukraine or Belarus.įigure 4 – Statistics of the developers’ accounts. Sharkbot has a handful of tricks up its sleeve. When the user enters credentials in these windows, the compromised data is sent to a malicious server. Sharkbot lures victims to enter their credentials in windows that mimic benign credential input forms.
#BINGO CALLER PRO 1.44 ANDROID#
It also makes use of Domain Generation Algorithm (DGA), an aspect rarely used in the world of Android malware. The malware implements a geofencing feature and evasion techniques that makes it stand out in the field. Sharkbot steals credentials and banking information. These applications pretended to be genuine AV solutions while in reality they downloaded and installed an Android Stealer called Sharkbot. This what the Check Point Research (CPR) team encountered while analyzing suspicious applications found in Google Play. When you search for Anti-Virus (AV) solutions to protect your mobile devices, you don’t expect these solutions to do the opposite i.e. Research by: Alex Shamshur, Raman Ladutska Introduction
