Security specialists have discovered a new variant of the TrickMo banking Trojan, which has compromised approximately 13,000 Android devices.
Zimperium, building on earlier research by Cleafy, indicates that the malware spreads primarily through phishing schemes and social engineering tactics, often disguising itself as genuine banking or utility applications.
This updated version of TrickMo poses a significant threat as it can hide its code from detection and capture device unlock patterns or PINs. Additionally, it has the ability to intercept login information, one-time passwords, access private files, grant permissions, record screens, and even remotely control devices.
These features contribute to its potential for serious threats, including identity theft.
Experts note that while TrickMo continues to function as a typical Android banking Trojan, the data it gathers could enable attackers to exploit victims on multiple fronts. This malware is linked to the TrickBot group, a criminal syndicate believed to operate out of Russia.
Zimperium’s research highlights that over 13,000 IP addresses have been affected, with victims predominantly found in Canada, the UAE, Turkey, and Germany, demonstrating the extensive impact of this malware campaign.
A major breach rocked the cryptocurrency exchange Bybit on Friday when Lazarus, North Korea’s notorious hacking group, stole over $1.5 billion in Ethereum and derivative tokens.
North Korea’s Lazarus Group has been identified as the mastermind behind a massive $1.4 billion Ethereum heist targeting cryptocurrency exchange Bybit, according to blockchain investigator ZachXBT.
Bybit, one of the leading cryptocurrency exchanges, has reportedly suffered a major security breach, with over $1.4 billion worth of digital assets drained from the platform.
Scammers recently attempted to deceive investors by launching a fake meme coin linked to Saudi Arabia’s Crown Prince Mohammed bin Salman.