KYCShadow: An Android Banking Malware Exploiting Fake KYC Workflows for Credential and OTP Theft
An Android malware campaign masquerading as a bank KYC verification application targets users in India through WhatsApp distribution. The threat operates as a multi-stage dropper installing secondary payloads while establishing persistent command-and-control communication. It combines native code obfuscation, Firebase-based remote execution, VPN-based traffic manipulation, and WebView-based phishing to systematically harvest sensitive user data. The infection chain progresses through deceptive update screens, VPN activation, silent APK installation, and extensive permission abuse. The deployed payload enables SMS interception, call control, USSD execution, and structured credential theft through staged phishing interfaces mimicking legitimate banking workflows. Exfiltrated data is encrypted locally and transmitted to jsonapi.biz, while critical configuration values are hidden inside native libraries to hinder detection.
Pulse ID: 69f1d2d45ec26fc5e1ca72f4
Pulse Link: https://otx.alienvault.com/pulse/69f1d2d45ec26fc5e1ca72f4
Pulse Author: AlienVault
Created: 2026-04-29 09:43:48
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#APK #Android #Bank #CyberSecurity #India #InfoSec #Malware #Mimic #OTX #OpenThreatExchange #Phishing #RAT #RCE #SMS #VPN #WhatsApp #bot #AlienVault