Close Menu
InfovistarInfovistar
  • AI & ML
  • Cybersecurity
  • Startup
  • Tech News
  • Insights
    • Web Development
    • AWS and Cloud
    • Blockchain and Cryptocurrency
    • Chatbots
    • Technology
    • DevOps
    • Resources
  • Courses
    • Machine Learning
      • Python Tutorial
      • TensorFlow Tutorial
      • OpenCV
    • DSA
      • Data Structures
    • Web Development
      • PHP Tutorial
      • CodeIgniter Tutorial
      • CodeIgniter 4 Tutorial
      • CodeIgniter 4 AJAX
      • JavaScript
    • Mobile Development
      • Android Tutorial
  • Tools
    • Beautifier
      • HTML Beautifier
      • JavaScript Beautifier
      • CSS Beautifier
    • Online Compilers
      • Python Compiler
      • Java Compiler
      • JavaScript Editor
      • PHP Compiler
      • C++ Compiler
      • C Compiler
    • Image Optimization
      • Image Compressor
      • JPEG to PNG
      • PNG to JPEG
      • WebP to PNG

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

WhatsApp Rolls Out AI Chat Support and Voice Calling for Businesses

July 2, 2025

Ransomware 2.0: How AI Is Changing Cyber Attacks Forever

April 18, 2025

Lovable AI Faces Major Threat from VibeScamming Attacks

April 10, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram Pinterest Vimeo
InfovistarInfovistar
  • AI & ML
  • Cybersecurity
  • Startup
  • Tech News
  • Insights
    • Web Development
    • AWS and Cloud
    • Blockchain and Cryptocurrency
    • Chatbots
    • Technology
    • DevOps
    • Resources
  • Courses
    • Machine Learning
      • Python Tutorial
      • TensorFlow Tutorial
      • OpenCV
    • DSA
      • Data Structures
    • Web Development
      • PHP Tutorial
      • CodeIgniter Tutorial
      • CodeIgniter 4 Tutorial
      • CodeIgniter 4 AJAX
      • JavaScript
    • Mobile Development
      • Android Tutorial
  • Tools
    • Beautifier
      • HTML Beautifier
      • JavaScript Beautifier
      • CSS Beautifier
    • Online Compilers
      • Python Compiler
      • Java Compiler
      • JavaScript Editor
      • PHP Compiler
      • C++ Compiler
      • C Compiler
    • Image Optimization
      • Image Compressor
      • JPEG to PNG
      • PNG to JPEG
      • WebP to PNG
Subscribe
InfovistarInfovistar
Home » DroidBot Android Trojan Targeting Banks and Cryptocurrency Exchanges
Cybersecurity

DroidBot Android Trojan Targeting Banks and Cryptocurrency Exchanges

InfovistarBy InfovistarDecember 7, 2024No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
DroidBot Android Trojan Targeting Banks and Cryptocurrency Exchanges
Share
Facebook Twitter LinkedIn Pinterest Email

A dangerous Android malware named DroidBot targets banks, cryptocurrency exchanges, and national organizations. This remote access trojan (RAT) malware uses advanced techniques to attack its victims. It combines hidden VNC, overlay attacks, and spyware-like capabilities such as keylogging and monitoring user interfaces.

Cleafy researchers Simone Mattia, Alessandro Strino, and Federico Valentini discovered this malware. They report that DroidBot uses dual-channel communication for greater flexibility and resilience. The malware transmits data using MQTT and receives commands through HTTPS.

DroidBot’s Malware-as-a-Service (MaaS) model allows affiliates to use its capabilities for a monthly fee of $3,000. It has impacted at least 77 financial institutions and organizations across Europe and beyond.

What is DroidBot?

DroidBot is a modern Android malware designed to attack financial systems. It allows hackers to control infected devices remotely. The malware disguises itself as legitimate apps like banking apps, Google Chrome, or generic security applications. Its primary goal is to steal sensitive information and compromise systems.

Cleafy researchers revealed that DroidBot has been active since June 2024. It became widely known after its discovery in late October 2024. This RAT is sold as a service, enabling affiliates to use it for customized attacks.

How DroidBot Operates

DroidBot works by exploiting Android’s accessibility services. These services allow it to monitor device activity, record keystrokes, and take control. It also uses two different communication protocols to operate efficiently.

malware-as-a-service (MaaS) model

The malware uses HTTPS to receive commands from hackers and MQTT to send stolen data back. MQTT is a messaging protocol often used in IoT devices, making DroidBot more versatile and resilient.

This dual-channel approach separates inbound and outbound communication. It ensures better control and reduces the chances of detection.

Also read | Google’s New Restore Credentials Tool Simplifies App Login

The Business Model

It operates under a malware-as-a-service (MaaS) model. Affiliates pay $3,000 monthly to access this malware. This fee provides access to:

  • A web control panel for customization.
  • Tools to generate infected APK files.
  • Options to issue commands and control infected devices.

At least 17 affiliate groups are currently using DroidBot. They customize the malware to target specific victims and steal sensitive data.

Affected Countries

DroidBot has been detected in several countries, including Austria, Belgium, France, Italy, Portugal, Spain, Turkey, and the United Kingdom. These campaigns are widespread and focus on financial systems and individual users.

The apps carrying DroidBot appear legitimate, making it harder for users to identify the threat.

Why it is Dangerous

It is not technically advanced compared to other malware, but its operational model is unique. The MaaS scheme gives affiliates powerful tools for creating custom attacks.

Its use of Android accessibility services makes it capable of stealing data and controlling devices remotely. Leveraging MQTT and HTTPS protocols ensures flexibility and reduces detection risks.

Also read | Critical WordPress Plugin Vulnerability Exposes Over 4 Million Sites

Key Features

  1. Hidden VNC and overlay attack techniques for stealing sensitive data.
  2. Keylogging and user interface monitoring to track user activities.
  3. Dual-channel communication for better operational efficiency.
  4. Disguised as legitimate apps to deceive users.

Origins of DroidBot

The threat actors behind DroidBot remain unknown. However, analysis of the malware suggests they are Turkish speakers.

Researchers noted that DroidBot is similar to other malware but stands out due to its operational model. The MaaS model is not commonly seen in such threats, making DroidBot a significant concern.

How to prevent this Attack

Users and organizations must stay vigilant to protect against DroidBot. Avoid downloading apps from unknown sources and check app permissions. Always update your devices with the latest security patches.

Banks and financial institutions should implement robust security measures to detect and prevent this type of malware.

Also read | Top 10 everyday apps that put your data at risk in 2024

DroidBot represents a new era of Android malware with its MaaS model and advanced techniques. It targets banks, cryptocurrency exchanges, and organizations, posing a significant security threat.

Users and businesses must take proactive steps to defend against DroidBot. Awareness and updated security practices are essential to minimize risks.

Found this article interesting? Follow us on Twitter and LinkedIn for more updates!

Android Malware Android Trojan Cybersecurity
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNvidia Fugatto: A revolutionary AI model for audio and music
Next Article Hackers using fake video apps to target Web3 Professionals data
Infovistar
  • Website
  • Facebook
  • X (Twitter)
  • Instagram
  • LinkedIn

Related Posts

Cybersecurity

Ransomware 2.0: How AI Is Changing Cyber Attacks Forever

April 18, 2025
Cybersecurity

Lovable AI Faces Major Threat from VibeScamming Attacks

April 10, 2025
Cybersecurity

Hackers Target Mac Users with Apple ID Phishing Scam

March 28, 2025
Add A Comment

Comments are closed.

Blog Categories
  • AI and ML (93)
  • Android (4)
  • AWS and Cloud (7)
  • Blockchain and Cryptocurrency (6)
  • Case Study (7)
  • Chatbots (5)
  • Cybersecurity (71)
  • DevOps (5)
  • Object-Oriented Programming (2)
  • Payment Gateway (4)
  • Resources (5)
  • Search Engine Optimization (3)
  • Startup (34)
  • Tech News (71)
  • Tech Tips (12)
  • Technology (79)
  • Trading (6)
  • Web Development (23)
Top Posts

Google is rolling out Identity Check Feature to Android 15

January 25, 20252,371 Views

How to Integrate Google Gemini to WhatsApp

February 16, 20241,721 Views

OpenAI Unveils Web-Based AI Agent Operator for Task Automation

January 24, 20251,502 Views
Stay In Touch
  • Facebook
  • YouTube
  • WhatsApp
  • Twitter
  • Instagram
  • Pinterest
  • LinkedIn
Latest Articles

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

Most Popular

Google is rolling out Identity Check Feature to Android 15

January 25, 20252,371 Views

How to Integrate Google Gemini to WhatsApp

February 16, 20241,721 Views

OpenAI Unveils Web-Based AI Agent Operator for Task Automation

January 24, 20251,502 Views
Our Picks

WhatsApp Rolls Out AI Chat Support and Voice Calling for Businesses

July 2, 2025

Ransomware 2.0: How AI Is Changing Cyber Attacks Forever

April 18, 2025

Lovable AI Faces Major Threat from VibeScamming Attacks

April 10, 2025

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

Facebook X (Twitter) Instagram Pinterest
  • About Us
  • Contact Us
  • Tools
  • Terms & Conditions
  • Privacy Policy
  • AdSense Disclaimer
© 2025 Infovistar. Designed and Developed by Infovistar.

Type above and press Enter to search. Press Esc to cancel.

Go to mobile version