Insidious Android malware gives up all malicious features but one to gain stealth – We Live Security
ESET researchers detect a new way of misusing Accessibility Service, the Achilles heel of Android security
ESET researchers have analyzed an extremely dangerous Android app that can perform a host of nefarious actions, notably wiping out the victims bank account or cryptocurrency wallet and taking over their email or social media accounts. Called DEFENSOR ID, the banking trojan was available on Google Play at the time of the analysis. The app is fitted with standard information-stealing capabilities; however, this banker is exceptionally insidious in that after installation it requires a single action from the victim enable Androids Accessibility Service to fully unleash the apps malicious functionality.
The DEFENSOR ID app made it onto the heavily guarded Google Play store thanks to its extreme stealth. Its creators reduced the apps malicious surface to the bare minimum by removing all potentially malicious functionalities but one: abusing Accessibility Service.
Accessibility Service is long known to be the Achilles heel of the Android operating system. Security solutions can detect it in countless combinations with other suspicious permissions and functions, or malicious functionalities but when faced with no additional functionality nor permission, all failed to trigger any alarm on DEFENSOR ID.
By all we mean all security mechanisms guarding the official Android app store (including the detection engines of the members of the App Defense Alliance) and all security vendors participating in the VirusTotal program (see Figure 1).
Figure 1. According to the VirusTotal service, no security vendor detected the DEFENSOR ID app until it was pulled off the Play store
DEFENSOR ID was released on Feb 3, 2020 and last updated to v1.4 on May 6, 2020. The latest version is analyzed here; we werent able to determine if the earlier versions were also malicious. According to its profile at Google Play (see Figure 2) the app reached a mere 10+ downloads. We reported it to Google on May 16, 2020 and since May 19, 2020 the app has no longer been available on Google Play.
The developer name used, GAS Brazil, suggests the criminals behind the app targeted Brazilian users. Apart from including the countrys name, the apps name is probably intended to imply a relationship with the antifraud solution named GAS Tecnologia. That security software is commonly installed on computers in Brazil as several banks require it to log into their online banking. However, there is also an English version of the DEFENSOR ID app (see Figure 3) besides the Portuguese one, and that app has neither geographical nor language restrictions.
Playing further off the suggested GAS Tecnologia link, the app promises better security for its users. The description in Portuguese promises more protection for the users applications, including end-to-end encryption. Deceptively, the app was listed in the Education section.
Figure 2. The DEFENSOR ID app on Google Play Portuguese version (translates roughly as: Your new Defensor app available for: / Individuals / Legal entities / From now on you will have more protection when using your applications, encryption for end-to-end users)
Figure 3. The DEFENSOR ID app on Google Play English version
After starting, DEFENSOR ID requests the following permissions:
If an unsuspecting user grants these permissions (see Figure 4), the trojan can read any text displayed in any app the user may launch and send it to the attackers. This means the attackers can steal the victims credentials for logging into apps, SMS and email messages, displayed cryptocurrency private keys, and even software-generated 2FA codes.
The fact the trojan can steal both the victims credentials and also can control their SMS messages and generated 2FA codes means DEFENSOR IDs operators can bypass two-factor authentication. This opens the door to, for example, fully controlling the victims bank account.
To make sure the trojan survives a device restart, it abuses already activated accessibility services that will launch the trojan right after start.
Figure 4. The permission requests by DEFENSOR ID
Our analysis shows the DEFENSOR ID trojan can execute 17 commands received from the attacker-controlled server such as uninstalling an app, launching an app and then performing any click/tap action controlled remotely by the attacker (see Figure 5).
Figure 5. The list of commands DEFENSOR ID may get from its C&C server
In 2018, we saw similar behavior, but all the click actions were hardcoded and suited only for the app of the attackers choice. In this case, the attacker can get the list of all installed apps and then remotely launch the victims app of their choice to either steal credentials or perform malicious actions (e.g. send funds via a wire transfer).
We believe that this is the reason the DEFENSOR ID trojan requests the user to allow Modify system settings. Subsequently, the malware will change the screen off time-out to 10 minutes. This means that, unless victims lock their devices via the hardware button, the timer provides plenty of time for the malware to remotely perform malicious, in-app operations.
If the device gets locked, the malware cant unlock it.
When we analyzed the sample, we realized that the malware operators left the remote database with some of the victims data freely accessible, without any authentication. The database contained the last activity performed on around 60 compromised devices. We found no other information stolen from the victims to be accessible.
Thanks to this data leak, we were able to confirm that the malware really worked as designed: the attacker had access to the victims entered credentials, displayed or written emails and messages, etc.
Once we reached the non-secured database, we were able to directly observe the apps malicious behavior. To illustrate the level of threat the DEFENSOR ID app posed, we performed three tests.
First, we launched a banking app and entered the credentials there. The credentials were immediately available in the leaky database see Figure 6.
Figure 6. The banking app test: the credentials as entered (left) and as available in the database (right)
Second, we wrote a test message in an email client. We saw the message uploaded to the attackers server within a second see Figure 7.
Figure 7. The email message test: the message as written (left) and as available in the database (right)
Third, we documented the trojan retrieving the Google Authenticator 2FA code.
Figure 8. The software generated 2FA code as it appeared on the devices display (left) and as available in the database (right)
Along with the malicious DEFENSOR ID app, another malicious app named Defensor Digital was discovered. Both apps shared the same C&C server, but we couldnt investigate the latter as it had already been removed from the Google Play store.
Read the rest here:
Insidious Android malware gives up all malicious features but one to gain stealth - We Live Security
- Health Ministry and PAHO Host Media Session on Upcoming National Tobacco Control Bill - Love FM Belize - October 19th, 2025 [October 19th, 2025]
- Ask Lucas: My teens social media obsession is out of control - Cleveland.com - October 17th, 2025 [October 17th, 2025]
- Molding the Message - China Media Project - October 17th, 2025 [October 17th, 2025]
- From clicks to curation: How publishers can reclaim control of the media ecosystem - Digiday - October 15th, 2025 [October 15th, 2025]
- Orbans Propaganda State in Hungary Is Starting to Show Cracks - The New York Times - October 15th, 2025 [October 15th, 2025]
- How Chioma Ikeh is helping small businesses take back control of their social media - Businessday NG - October 13th, 2025 [October 13th, 2025]
- Germany will not support 'Chat Control' message scanning in the EU - The Record from Recorded Future News - October 11th, 2025 [October 11th, 2025]
- Media: IDF will control 53% of Gaza in the first phase of the agreement - Baku.ws - October 11th, 2025 [October 11th, 2025]
- Rob Reiner Says U.S. Will Become an Autocracy if Trump Is Allowed to Control the Media and Commandeer the Election: We Have a Year to Stop Him -... - October 7th, 2025 [October 7th, 2025]
- Rob Reiner Warns Trump Wants "Control Of Media" To Steal 2026 Election - Deadline - October 7th, 2025 [October 7th, 2025]
- Move over Murdochs, the Ellisons are the new family dynasty shaking up US media - BBC - September 30th, 2025 [September 30th, 2025]
- How Trumps TikTok Deal Could Change the Future of US Media - TODAY.com - September 30th, 2025 [September 30th, 2025]
- Meghan Markles Media Battles: Control, Conflicts, and the Struggle for Credibility - vocal.media - September 28th, 2025 [September 28th, 2025]
- Trump announces deal to put TikTok under control of US investors - ABC News - Breaking News, Latest News and Videos - September 28th, 2025 [September 28th, 2025]
- President Tebbounes Media Exchange: Inflation Control, Electoral Reform, and a Drive Toward Modernization - - September 28th, 2025 [September 28th, 2025]
- Raptors GM Bobby Webster meets with the media ahead of first season with full team control - Toronto Star - September 28th, 2025 [September 28th, 2025]
- Murdochs TikTok? Trump offers allies another lever of media control - The Guardian - September 25th, 2025 [September 25th, 2025]
- Even legacy media admit left-wing violence is out of control - The Heartlander - September 25th, 2025 [September 25th, 2025]
- Capture the Media, Control the Culture? - The American Prospect - September 23rd, 2025 [September 23rd, 2025]
- Whats actually in the Media Control Act? - Maldives Independent - September 23rd, 2025 [September 23rd, 2025]
- Power Play: Murdochs, Ellison, and Dell Join Forces for TikTok Bid - International Business Times UK - September 23rd, 2025 [September 23rd, 2025]
- Jimmy Kimmel and the MAGA strong-arming of American media - Media Matters for America - September 19th, 2025 [September 19th, 2025]
- Abbreviated Pundit Roundup: Controlling the media controls the message - Daily Kos - September 19th, 2025 [September 19th, 2025]
- The 31-day sprint: a timeline of the "media control law" - Maldives Independent - September 19th, 2025 [September 19th, 2025]
- Trump Admin Says Framework Reached for U.S. Owners to Take Control of TikTok - Gizmodo - September 17th, 2025 [September 17th, 2025]
- "We have a prime ministerial republic"/ Media: Changes to the Constitution, control of the Assembly and the opposition - cna.al - September 17th, 2025 [September 17th, 2025]
- Rupert Murdochs family reaches deal on who will control media empire after his death - Toronto Sun - September 15th, 2025 [September 15th, 2025]
- Erdogan tightens his control over the media - Atalayar - September 13th, 2025 [September 13th, 2025]
- Social Media May Be Fueling Negative Reactions To Birth Control Pills, Study Finds - indica News - September 13th, 2025 [September 13th, 2025]
- Usham backs Media Bill as a tool for lawful information dissemination - Edition.mv - September 13th, 2025 [September 13th, 2025]
- Big Data Leak in Pakistan: Where Is the Government Control? - The Media Line - September 13th, 2025 [September 13th, 2025]
- Tim Dillon Was Far From Funny in Joke About Jewish Control of the Media - Algemeiner.com - September 11th, 2025 [September 11th, 2025]
- Inside the Deal Ending the Murdoch Succession Fight - The New York Times - September 11th, 2025 [September 11th, 2025]
- ChamSys Acquires Arkaos MediaMaster, GrandVJ And KlingNet To Deliver Unified Lighting, Pixel Mapping And Media Control Solution - Live Design Online - September 11th, 2025 [September 11th, 2025]
- Lachlan finally has control of Murdoch empire but deal is a win for sibling rivals - The Guardian - September 11th, 2025 [September 11th, 2025]
- Lachlan Murdoch is now in control of News Corp and its Australian newspapers are safe for now - The Guardian - September 11th, 2025 [September 11th, 2025]
- Sri Lanka to expand scope of controversial 1970s media control law - EconomyNext - September 11th, 2025 [September 11th, 2025]
- Journalists stage protest near Majlis after being ousted from committee reviewing media control bill - raajje.mv - September 11th, 2025 [September 11th, 2025]
- Murdoch heirs settle dispute over control of the right-wing mogul's media empire - France 24 - September 9th, 2025 [September 9th, 2025]
- ChamSys acquires Arkaos MediaMaster to deliver unified lighting, pixel mapping and media control solution - Cinematography World - September 9th, 2025 [September 9th, 2025]
- Rupert Murdochs family reaches deal on who will control media empire after his death - AP News - September 9th, 2025 [September 9th, 2025]
- The Murdoch Succession Fight Is Over. So What Does Lachlan Control? - The New York Times - September 9th, 2025 [September 9th, 2025]
- Rupert Murdochs family reaches deal on who will control media empire after his death - Inquirer.com - September 9th, 2025 [September 9th, 2025]
- The real-life 'Succession' fight for control of the Murdoch media empire has come to an end - MSN - September 9th, 2025 [September 9th, 2025]
- Rupert Murdochs family reaches deal on who will control media empire after his death - WXXV News 25 - September 9th, 2025 [September 9th, 2025]
- The real-life 'Succession' fight for control of the Murdoch media empire has come to an end - Business Insider - September 9th, 2025 [September 9th, 2025]
- ChamSys Acquires Arkaos MediaMaster, GrandVJ and KlingNet to Deliver Unified Lighting, Pixel Mapping and Media Control Solution - etnow.com - September 9th, 2025 [September 9th, 2025]
- Rupert Murdochs family reach deal on who will control media empire after death - STV News - September 9th, 2025 [September 9th, 2025]
- Murdoch family resolves succession dispute with Lachlan remaining in control of media empire - 9News - September 9th, 2025 [September 9th, 2025]
- Outrage over 'ghost projects' for flood control lands on Filipino 'nepo babies' flaunting wealth on social media - Mothership - September 6th, 2025 [September 6th, 2025]
- Serbia: Media freedom groups warn against attempt to seize political control of last remaining independent TV stations N1 and Nova - ipi.media - September 5th, 2025 [September 5th, 2025]
- Sean Plunket now stands alone on his Platform - The Spinoff - September 5th, 2025 [September 5th, 2025]
- Maldives: Government faces increasing backlash on media control bill / FIP - International Federation of Journalists - IFJ - August 29th, 2025 [August 29th, 2025]
- Journalists sound alarm over bill to shackle free media - Raajje.mv - August 29th, 2025 [August 29th, 2025]
- Pres. denies media control: Not something I'm interested in, nor have I ever done - Raajje.mv - August 27th, 2025 [August 27th, 2025]
- Media control bill won't silence the people, even if passed: Mariya - Raajje.mv - August 27th, 2025 [August 27th, 2025]
- Media control bill placed on agenda for parliaments extraordinary sitting tomorrow - Edition.mv - August 27th, 2025 [August 27th, 2025]
- National Day, freedom bounds and media control - Maldives Independent - August 26th, 2025 [August 26th, 2025]
- How to manage social media notifications and regain control - Kurt the CyberGuy - August 22nd, 2025 [August 22nd, 2025]
- Orban and Fidesz: fifteen years of media control and an anti-Ukrainian strategy News from Fakti.bg - World - fakti.bg - August 22nd, 2025 [August 22nd, 2025]
- Taylor Swift Found a New Way to Control Her Narrative: Podcasts - The New York Times - August 16th, 2025 [August 16th, 2025]
- Influencers criticize birth control and push 'natural' methods. Here's what to know - NPR - August 12th, 2025 [August 12th, 2025]
- $250K Monster Month promotion withdrawn after dispute over social media control - Frequency News - August 7th, 2025 [August 7th, 2025]
- Analysis: Information is power, and Trump wants more control over it - CNN - August 7th, 2025 [August 7th, 2025]
- How to reassign keyboard keys in Windows 11 - theregister.com - July 24th, 2025 [July 24th, 2025]
- Google Maps media control feature missing on Android - VnExpress International - July 24th, 2025 [July 24th, 2025]
- Bitfocus Buttons Enterprise Edition Unveiled at IBC2025 with Advanced Features - Digital Studio India - July 10th, 2025 [July 10th, 2025]
- Assembly Launches 'Assembly Control' to Elevate Brand Safety, Suitability, and Campaign Performance in Programmatic Media - Yahoo Finance - July 10th, 2025 [July 10th, 2025]
- Bluesky Gives Users More Control Over their Notifications - Social Media Today - July 8th, 2025 [July 8th, 2025]
- Spin Control: Media struggles after Trump swears with cameras rolling - The Spokesman-Review - July 8th, 2025 [July 8th, 2025]
- Beyond banks and brokers: All about decentralized finance (DeFi) - Britannica - July 8th, 2025 [July 8th, 2025]
- The Future of Crypto Payroll Security: Bitchat and Decentralized Messaging - OneSafe - July 8th, 2025 [July 8th, 2025]
- Paradigm leads $11.5 million funding round in Kuru Labs, a decentralized exchange blending CLOBs and AMMs - The Block - July 8th, 2025 [July 8th, 2025]
- Decentralized Payroll: The Future of Work - OneSafe - July 8th, 2025 [July 8th, 2025]
- Jack Dorsey tests Bitchat decentralized messaging without internet - Cointelegraph - July 8th, 2025 [July 8th, 2025]
- CrossFis Haley Cromer on Bridging Traditional Finance and Web3 for a Decentralized Future - BlockTelegraph - July 8th, 2025 [July 8th, 2025]
- India's Crypto Tax: Navigating New Norms with Decentralized Solutions - OneSafe - July 8th, 2025 [July 8th, 2025]
- Turkey Tightens Its Grip on Crypto: What It Means for Decentralized Exchanges - OneSafe - July 8th, 2025 [July 8th, 2025]
- Spheron and AIxBlock Unite to Democratize Decentralized AI - CoinTrust - July 8th, 2025 [July 8th, 2025]
- The Role of Web3 in Shaping NFT Marketplace Opportunities - Vocal - July 8th, 2025 [July 8th, 2025]