For Infecting Over 1 Million Phones With Android Malware Cyber Crime Gang Arrested

android malware

The Russian Interior Ministry introduced on Monday the arrest of 20 people from a prime cybercriminal gang that had stolen nearly $900,000 from bank debts after infecting over 1,000,000 Android smartphones with a mobile android malware referred to as “CronBot.”
Russian Interior Ministry representative Rina Wolf said the arrests were part of a joint effort with Russian IT safety firm group-IB that assisted the massive research.

The collaboration resulted in the arrest of sixteen participants of the Cron institution in November 2016, whilst the closing energetic individuals have been apprehended in April 2017, all residing within the Russian regions of Ivanovo, Moscow, Rostov, Chelyabinsk, and Yaroslavl and the Republic of Mari El.

Focused Over 1 Million telephones By Android Malware — How They Did It?

Organization-IB first found out of the Cron malware gang in March 2015, when the criminal gang was dispensing the Cron Bot malware disguised as Viber and Google Play apps.

The Cron malware gang abused the popularity of SMS-banking offerings and distributed the android malware onto sufferers’ Android devices by way of putting in apps designed to mimic banks’ legitimate apps.

The gang even inserted the android malware into fake mobile apps for famous pornography websites, along with PornHub.

Once victims downloaded and mounted these faux apps on their devices, the apps introduced themselves to the auto-begin and the android malware hidden interior them granted the hackers the potential to phish sufferers’ banking credentials and intercept SMS messages containing affirmation codes sent through the bank to confirm the transactions.

“After installation, the program added itself to the auto-begin and could send SMS messages to the smartphone numbers indicated by the criminals, upload SMS messages received by the victim to C&C servers, and conceal SMS messages coming from the financial institution,” writes group-IB.

Also Read: Mini-Guide to Bug Bounty Hunting

“The approach becomes instead simple: after a sufferer’s smartphone were given infected, the Trojan may want to robotically switch cash from the person’s financial institution account to money owed controlled through the intruders. To efficiently withdraw stolen cash, the hackers opened greater than 6 thousand financial institution bills.”

The group usually sent textual content messages to the banks initiating a transfer of as much as $120 to certainly one of their 6,000 financial institutions accounts the institution installation to receive the fraudulent bills.

The Android malware could then intercept the 2-step verification codes sent using the financial institution to verify the transaction and block the victims from receiving a message notifying them approximately the transaction.

Cyber thieves Stole $900,000 inside Russia alone.

On April 1, 2016, the gang advertised its Android banking Trojan, dubbed “Cron Bot,” on a Russian-talking forum, giving the organization-IB researchers and Russian authorities a clue to their investigation into the institution’s operation.

In line with the safety company, the institution stole approximately 8,000 Rubles (nearly $100) from a sufferer on a mean, fetching a total amount of fifty Million Rubles (nearly $900,000) from greater than 1,000,000 sufferers, with three,500 precise Android devices infected in line with day.

After concentrating on customers of the financial institution in Russia, in which they have been residing in, the Cron gang planned to enlarge its operation via targeting clients of banks in numerous international locations, together with the USA, the UK, Germany, France, Turkey, Singapore, and Australia.

In June 2016, the gang rented a chunk of android malware called “Tiny.z” for $2,000 in line with month, designed to attack clients of Russian banks in addition to global banks in Britain, Germany, France, US, and Turkey, among other countries.

Regardless of running only in Russia before their arrest, the gang members had already developed internet injections for numerous French banks including Credit Agricole, guarantee Banque, BNP Paribas, Banque Populaire, Boursorama, Caisse d’Epargne, Societe Generale, and LCL, institution-IB said.

But, before the group should release attacks on French banks, the authorities controlled to disrupt their operations by using making several arrests, including the crowd’s founder, a 30-yr-vintage resident of Ivanovo, Moscow.

All through the raids, the authorities seized laptop equipment, financial institution cards, and SIM playing cards related to the crook gang.


  1. I am sure this article has touched all the internet people,
    its really really nice post on building up new website.


Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.