[ad_1]
The Medusa Android banking Trojan has resurfaced after virtually disappearing for almost a year, proving to be more menacing than ever. Its new variant is leaner, demanding fewer device permissions, thus helping it dodge detection.
The Turkish-associated Trojan, known as Medusa, was detected in 2020, initially zeroing in on Turkish banking institutions.
By 2022, the Trojan had broadened its operations, initiating massive campaigns in North America and Europe, inflicting serious financial damage. The new variant of Medusa is now striking Android users worldwide, including in countries such as the U.S., Canada, Spain, France, Italy, the U.K., and Turkey.
CLICK HERE TO ACCESS THE FOX NEWS APP
An individual examines his Android device
(Photo: Kurt “CyberGuy” Knutsson)
Understanding How Medusa Evades Detection
Since its reappearance in July 2023, the Medusa attacks have returned, but with a new twist. Experts from Cleafy’s cybersecurity team have observed a surge in installations of an app named “4K Sports,” used by hackers to disseminate malware onto people’s Android devices. What they’re installing is an updated version of Medusa, showcasing notable variations in its operation.
It now requires fewer permissions, making it even more covert. However, it still seeks Accessibility Services, a significant warning sign. Android’s Accessibility Service is a powerful utility that aids those with disabilities in using mobile devices with more ease. Granting an app Accessibility permissions effectively hands over control of your phone to the app.
FIND MORE U.S. NEWS HERE
This hasn’t gone unnoticed by cybercriminals. Therefore, a majority of malware infecting your phone will demand Accessibility permissions. You should treat any requests for permissions in this area as suspicious. The new variant of Medusa also requests Broadcasting SMS, Internet Foreground Service, and Package Management permissions.
The Android Trojan now operates with 17 fewer commands than its predecessor but includes five new ones, such as setting up a black screen overlay, capturing screenshots, and more.
Cleafy has established that along with the 4K Sports app, hackers are also utilizing counterfeit apps such as Google Chrome, InatTV, Purolator, and 5G to install Medusa. In the U.S., Chrome, InatTV, and Purolator are the primary apps of choice for these attackers.

A person using their Android device.
(Photo: Kurt “CyberGuy” Knutsson)
BEST ANTIVIRUS FOR ANDROIDS — CYBERGUY’S TOP PICKS FOR 2024
Grasping the Extent of the Medusa Cyberattack
Medusa is making victims worldwide, with its sights set on the U.S. and Europe. Cleafy discovered two separate Medusa botnet groups, each with its unique mode of operation.
The first botnet group, comprising AFETZEDE, ANAKONDA, PEMBE, and TONY, primarily targets Turkish people but also infiltrates Canada and the U.S. They utilize Medusa’s conventional tactics, such as phishing to disseminate the malware.
The second group, which includes the UNKN botnet, demonstrates a shift in Medusa’s strategy. It primarily focuses on European users, particularly those in Italy and France. Surprisingly, some of these new variants were installed via apps downloaded from unreliable sources, indicating that hackers are exploring different avenues to disseminate the malware beyond the conventional phishing route.

Illustration of a cybercriminal.
(Illustration: Kurt “CyberGuy” Knutsson)
ANDROID BANKING TROJAN DISGUISES AS GOOGLE PLAY TO STEAL YOUR PERSONAL DATA
10 Ways to Defend Against the Android Banking Trojan
Although a Trojan can be difficult to identify and potentially hazardous once inside your phone, there are measures you can take to safeguard your data.
1. Be Wary of Phishing Attempts: Remain vigilant regarding emails, calls, or messages from unknown sources asking for private information. Dodge clickbait links or refrain from divulging sensitive details unless the legitimacy of the request can be verified.
2. Use Robust Antivirus Software: Android has its own built-in malware security called Play Protect, but it’s insufficient to halt all malicious software. Historically, Play Protect hasn’t been entirely effective at eliminating all known malware from Android phones. Explore my picks for the top 2024 antivirus protection winners for your Windows, Mac, Android, and iOS devices.
3. Download Apps from Trustworthy Sources: Download apps exclusively from reliable sources like the Google Play Store, as they conduct rigorous tests to prevent malware and other harmful software.
CLICK HERE TO ACCESS FOX BUSINESS ON THE GO
4. Utilize Identity Theft Protection Services: Identity theft companies can monitor crucial information and advise you in the event it’s being traded on the dark web or used to open an account. They can also aid in suspending your bank and credit card accounts to halt any further illegal use by culprits. The best aspect of utilizing these services is that they might include identity theft insurance of up to $1 million to cover losses and legal fees. Check out my tips and best picks to protect yourself from identity theft.
5. Supervise Your Accounts: Monitor your bank and other financial statements for any unauthorized transactions if you suspect you have been breached by the banking Trojan.
6. Activate SMS Notifications for Your Bank Accounts: By enabling SMS notifications, you can keep track of any unauthorized transactions.
7. Implement Two-Factor Authentication (2FA): 2FA adds an extra layer of security to stop hackers from accessing your accounts.
8. Use a Password Manager: A password manager can assist you in creating and storing robust, unique passwords for all your accounts, reducing the risk of password theft.
9. Regularly Update Your Device’s Operating System and Apps: Regularly updating your software is essential, as updates usually include security patches for new vulnerabilities that could be exploited by Trojans.
10. Be Careful When Granting Permissions: Closely review the permissions that apps request. If an app asks for excessive access beyond its functionality, it should be considered suspicious.
HOW TO ELIMINATE YOUR PRIVATE DATA FROM THE INTERNET
Key Insights from Kurt
The architects behind Medusa have designed the malware to be challenging to detect. They employ seemingly legitimate apps to smuggle the malware onto your phone and exploit your personal data, and potentially your funds. As a rule of thumb, only download apps from the Google Play Store. Google ensures that only secure apps are allowed on its platform, making it a safer alternative to any other app store.
What are your thoughts on the escalating sophistication of mobile malware like the Medusa Trojan, and how should the cybersecurity industry react? Share your thoughts at Cyberguy.com/Contact
To stay up-to-date with my tech tips and security alerts, sign up for my free CyberGuy Report Newsletter at Cyberguy.com/Newsletter
Pose a question for Kurt or tell us about topics you’d like us to cover.
Follow Kurt on his social media channels:
Find answers to the most-asked questions about CyberGuy:
Copyright 2024 CyberGuy.com. All rights reserved.
[ad_2]