Android malware steals one-time passcodes

The malware uses call forwarding to intercept voice calls with the passcode

One-time passcodes, a crucial defense for online banking applications, are being intercepted by a malware program for Android, according to new research from Symantec.

The malware, called Android.Bankosy, has been updated to intercept the codes, which are part of so-called two-factor authentication systems.

Many online banking applications require a login and password plus a time-sensitive code in order to gain access. The one-time passcode is sent over SMS but also can be delivered via an automated phone call.

Some banks have moved to call-based delivery of passcodes. In theory, that provides better security since SMS messages can be intercepted by some malware, wrote Dinesh Venkatesan of Symantec in a blog post on Tuesday.

But Bankosy has been updated to forward all calls to the attackers, Venkatesan wrote. In the Asia-Pacific region, many operators use a service code in the format *21*[destination number]# to forward calls, which Bankosy has implemented.

The malware also "has support for disabling and enabling silent mode in addition to locking the device so that the victim is not alerted during an incoming call," Venkatesan wrote.

The one-time passcode is used with the victim's login credentials, which the attackers have presumably already obtained.

Symantec detected Bankosy in July 2014. A technical writeup from that time shows the malware also prompted victims to enter their payment card information in a more bold attempt at fraud.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags malwareAndroidoperating systempasscodes

More about Symantec

Show Comments
[]