• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Guide
  • Home Improvement
  • Gadget & Apps
  • Deals
  • News

Android Trojan targeting online banking users spotted

By Guest Authors

Security researchers at Symantec have discovered an Android Trojan that is designed to target users of online banking services through various phishing pages the attackers deliver from cloud servers.

According to their findings, the Android.Fakelogin Trojan works to copy a legit login page from a banking app that has been installed in the targeted device, and create a fake login page – essentially a phishing page – that the attackers would use to overlay the legit app login.

android_trojan

This tactic is called social engineering, and holds the potential to extract banking credentials from a vast demographic of users. Unlike other phishing campaigns that disguise as a legit app, Android.Fakelogin on the other hand first determines what kind of a banking app is in the device and then maneuvers the app’s user interface by overlaying it with their tailored malicious page.

Android.Fakelogin identifies what phishing page to customize by penetrating a remote command-and-control server that hosts a cloud-based logic. Symantec claims it is hard to reverse engineer the malware because of the stealthy way it operates.

The Trojan seems to work on old versions of Android, with the exception of Marshmallow. The malware comes as game apps that are sent as payloads from the downloader malware in order to bring other malware to the targeted device.

Once the malware is downloaded and installed in a device, it disguises itself as an SMS app and forces permission to administer device settings. It is hard to detect the fake app because its icon is hidden.

When the malware is able to gain the required permission, it will start stealing data after downloading several application package names from the cloud and stores them in what is called a preference file. The file is used to identify the target banking apps, which will be force-injected with malicious content to carry out the phishing campaign.

The identification process includes searching for the name of app that runs on the handset and if the result includes a name of an app that is listed in the preference file, the malware transmits the app’s package name to the cloud in order to imitate it.

The approach is highly flexible because it depends on the cloud, meaning updates are not necessary as is the case with other malware in coping with security tools.

How to mitigate the security issue?

Multiple steps for permission is necessary such as the two-factor verification in order to protect against this threat. Also, download the new Android 6.0 Marshmallow because Android.Fakelogin’s features do not work on it. Stay updated with your software and make sure that the apps you install comes from legit app stores.

Disclosure: We might earn commission from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Footer

Hernest Lira 47″ Oak Cabinet With Glass Doors Review

GLACIER FRESH 2.25G Countertop Water Filtration System Review – The Perfect Middle Ground Between Pitchers and RO

TourBox Elite Plus Review: A Better Way to Edit in Lightroom Classic

ELEHEAR Beyond Pro OTC Hearing Aids Review & Black Friday Deal

Follow TechWalls

YoutubeFacebookXInstagram

Recent Posts

  • Hernest Lira 47″ Oak Cabinet With Glass Doors Review
  • GLACIER FRESH 2.25G Countertop Water Filtration System Review – The Perfect Middle Ground Between Pitchers and RO
  • PFAS at Home: What the New Standards Mean and How to Respond
  • Astravolt’s Silicon Valley Debut: When Energy Becomes Intelligent Infrastructure

Copyright © 2026 · All Rights Reserved