By faking the bank’s 2FA application, hackers discovered Revive, an Android virus that targets BBVA bank accounts in Spain.
Revive takes a more targeted strategy, focusing more on the bank than the customers.
How does Revive operate?
Revive virus targets potential victims using phishing attempts, claims Cleafy, an Italian security firm.
Through this phishing operation, customers are told that the 2FA feature present in the actual bank app is no longer enough and that they must download a 2FA tool in order to ensure the security of their accounts.
A video instruction is available on the spoof website to walk victims through downloading and installing it.
After the installation is complete, Revive asks for authorization to utilise the Accessibility Service, granting access to take full control of the screen and allow for screen touches and navigational operations.
Granting a variety of access
Users are asked to provide the app access to SMS and phone calls, which then directs them to the fake bank’s page where they must input their login information.
After gaining access, Revive keeps working in the background as a simple keylogger.
As a result, either keylogging activities or the phishing website can be used to steal passwords. SMS messages that are intercepted allow for 2FA.
Highly undetectable is Revive
With the use of a special control panel, Revive collects passwords and intercepts SMS communications. Many businesses fail to notice it.
Fewer chances exist for security companies to track down these threats and develop identifying criteria.
In addition, restricted targeting and brief campaigns have given threat actors more time to remain undetected. Additionally, it has adequate time to regionalize its operations.
Revive and Teradroid, another Android malware, have a lot in common, especially when it comes to their APIs, web frameworks, and features.
Banks are one of the threat actors’ primary targets, therefore as they grow in strength, hosts must improve their security to stay competitive. To defend against banking Trojans like Revive, personnel must be trained, and the appropriate cybersecurity technologies must be used.