These two dangerous Trojan 'dropper' Android apps have already been installed thousands of times

Bad Bots
(Image credit: Gonin / Shutterstock)

A new, and rather successful campaign to deliver Trojans to Android users has been uncovered by cybersecurity researchers from Threat Fabric.

The experts warn that ever since Google made updates to its “Developer Program Policy”, threat actors have been looking for new ways to deliver malware through the Play Store and stay under the radar while doing it. 

This new campaign includes multiple droppers, with more than 130,000 downloads between them, deploying two known Trojans to the victims’ mobile endpoints: Sharkbot and Vultur. While Sharkbot’s targets are exclusively Italians, Vultur’s operators are casting a somewhat larger net, targeting not just Italians, but also people in the UK, The Netherlands, Germany, and France.

Fake updates

Sharkbot’s modus operandi is simple: the version found on Google’s mobile app repository is not malicious, but as soon as the user turns it on, it displays a fake Play Store page, forcing the victim to “update” the app before using it. “Since victims are sure about the origin of the application, they will highly likely install and run the downloaded Sharkbot payload,” the researchers concluded. 

Sharkbot’s goal is to transfer money, from bank accounts belonging to the victims, to the operators, via Automatic Transfer Systems. NCC Group described it as an “advanced technique” rarely used with Android malware, which enables threat actors to auto-fill fields in legitimate mobile banking apps.

Vultur, on the other hand, targets social media and messaging applications, banking apps and cryptocurrency exchange apps. 

Between the two, Vultur seems to be the more successful Trojan, as Threat Fabric says it reached more than 100,000 potential fraud victims in the last few months. 

“Distribution through droppers on Google Play still remains the most “affordable” and scalable way of reaching victims for most of the actors of different levels,” researchers concluded. 

“While sophisticated tactics like telephone-oriented attack delivery require more resources and are hard to scale, droppers on official and third-party stores allow threat actors to reach wide unsuspecting audience with reasonable efforts.”

  • Resist viruses and ransomware with the best firewall tools around

Via: Security Affairs

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Malware worm
Coordinated global mobile malware campaign targets banking apps and cryptocurrency platforms
An Android phone being held in the hand
These malicious Android apps were installed over 60 million times - here's how to stay safe
Spyware
Government-linked Italian spyware maker caught distributing malicious Android apps
Android phone malware
This nasty Android malware is posing as the Telegram Premium app
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
BadBox malware hit after infecting over 500,000 Android devices
A close-up photo of an iPhone, with the App Store icon prominent in the center of the image.
App stores are increasingly becoming a major security worry
Latest in Security
cybersecurity
Chinese government hackers allegedly spent years undetected in foreign phone networks
Data leak
A major Keenetic router data leak could put a million households at risk
Code Skull
Interpol operation arrests 300 suspects linked to African cybercrime rings
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Multiple routers hit by new critical severity remote command injection vulnerability, with no fix in sight
Code Skull
This dangerous new ransomware is hitting Windows, ARM, ESXi systems
An abstract image of a lock against a digital background, denoting cybersecurity.
Critical security flaw in Next.js could spell big trouble for JavaScript users
Latest in News
DeepSeek
Deepseek’s new AI is smarter, faster, cheaper, and a real rival to OpenAI's models
Open AI
OpenAI unveiled image generation for 4o – here's everything you need to know about the ChatGPT upgrade
Apple WWDC 2025 announced
Apple just announced WWDC 2025 starts on June 9, and we'll all be watching the opening event
Hornet swings their weapon in mid air
Hollow Knight: Silksong gets new Steam metadata changes, convincing everyone and their mother that the game is finally releasing this year
OpenAI logo
OpenAI just launched a free ChatGPT bible that will help you master the AI chatbot and Sora
An aerial view of an Instavolt Superhub for charging electric vehicles
Forget gas stations – EV charging Superhubs are using solar power to solve the most annoying thing about electric motoring