Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

For privacy and security, think carefully before granting AI access to your personal data

Benchmark for Greptile’s Lead Series A lecture, AI Code Reviewer, valued at $100 million, according to sources

Why Y Combinator Startups Working on Windows AI Agents and Get Pivoted

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » The new TGTOXIC Banking Trojan variant evolves with anti-analytic upgrades
Identity

The new TGTOXIC Banking Trojan variant evolves with anti-analytic upgrades

userBy userFebruary 27, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 27, 2025Ravi LakshmananCybercrime / Android

Cybersecurity researchers have discovered an updated version of Android malware called TgToxic (also known as toxicity), indicating that the threat actors behind it are making constant changes in response to public reports.

“The changes seen in the TGTOXIC payload reflect the ongoing surveillance of the actors’ open source intelligence, indicating their commitment to improving security measures and enhancing the malware capabilities that keep researchers at bay,” Intel 471 said in a report released this week.

TGTOXIC was first documented by Trend Micro in early 2023 and described it as a Trojan horse for Crypto Wallets and banks that can steal qualifications and funds from banks and financial apps. It focuses primarily on mobile users in Taiwan, Thailand and Indonesia, and has been detected in the wild since at least July 2022.

Cybersecurity

Then, in November 2024, Italian online fraud prevention company Cleafy detailed an updated variant with a wide range of data collection capabilities, expanding its operational scope, including Italy, Portugal, Hong Kong, Spain and Peru. Malware is rated as the job of Chinese-speaking threat actors.

The latest analysis of Intel 471 shows that malware is distributed via SMS messages or via Dropper APK files via phishing websites. However, the exact delivery mechanism remains unknown.

Notable improvements include improved emulator detection capabilities and an update to the command and control (C2) URL generation mechanism, highlighting the ongoing commitment to analytical efforts.

“Malware conducts a thorough evaluation of the hardware and system capabilities of the device to detect emulation,” Intel 471 says. “Malware examines a set of device properties, including brands, models, manufacturers, and fingerprint values ​​to identify discrepancies typical of emulated systems.”

Another important change is to create a fake profile containing an encrypted string pointing to the actual C2 server, using forums such as the Atlassian Community Developer forum, from a hard-coded C2 domain embedded within the malware configuration.

The TGTOXIC APK is designed to randomly select one of the community forum URLs provided in a configuration that acts as a dead-drop resolver for a C2 domain.

This technique offers several advantages. This makes it easier for threat actors to modify the C2 server by simply pointing the community user profile to the new C2 domain without issuing an update to the malware itself.

“This method greatly extends the operational lifespan of malware samples and maintains functionality as long as the user profiles on these forums remain active,” Intel 471 said.

Cybersecurity

Subsequent iterations of TGTOXIC discovered in December 2024 rely on the Domain Generation Algorithm (DGA) to create a new domain name to use as a C2 server. This allows you to create multiple domain names using DGA, making malware more resilient to confusion efforts and allow you to switch to a new domain even if the attacker is removed.

“TGTOXIC stands out as a highly sophisticated Android Banking Trojan with advanced anti-analytic technology, including obfuscation, payload encryption, and ejection prevention mechanisms that avoid detection by security tools.”

“The use of dynamic command and control (C2) strategies such as domain generation algorithms (DGAs), and their automation capabilities allow users to hijack user interfaces, steal entitlements, and perform fraudulent transactions against fraudulent measurements.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHow Trump Dismissed Project 2025 Shapes His Health Policy | Donald Trump News
Next Article 89% of Enterprise Genai use is not visible to organizations exposing serious security risks, new reports reveal
user
  • Website

Related Posts

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

July 18, 2025

China’s vast tools secretly extract from SMS, GPS data and confiscated mobile phones.

July 18, 2025

UNG0002 group hits Hong Kong China in Pakistan using LNK files and rats in twin campaign

July 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

For privacy and security, think carefully before granting AI access to your personal data

Benchmark for Greptile’s Lead Series A lecture, AI Code Reviewer, valued at $100 million, according to sources

Why Y Combinator Startups Working on Windows AI Agents and Get Pivoted

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.