Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Rising Threat: Golddigger and Gigabud Banking Trojans Exploit Phishing Tactics

    Rising Threat: Golddigger and Gigabud Banking Trojans Exploit Phishing Tactics

    August 9, 2024

    In recent months, cybersecurity analysts have observed a troubling increase in the activity of Golddigger and Gigabud Android banking trojan. Since July 2024, Gigabud malware has seen a dramatic rise in detection rates. This uptick signifies a substantial increase in both the distribution and impact of the malware.

    Gigabud has adopted advanced phishing tactics, disguising itself as a legitimate airline application. These fraudulent apps are distributed through phishing websites that closely imitate the official Google Play Store, thereby deceiving users into downloading them.

    The Link Between Golddigger and Gigabud Malware

    Injection Chain (Source: Cyble)

    According to Cyble Intelligence and Research Labs (CRIL), the malware’s geographical reach has expanded significantly. Initially focusing on regions like Vietnam and Thailand, Gigabud now targets users in Bangladesh, Indonesia, Mexico, South Africa, and Ethiopia. This broader scope indicates a strategic expansion in the malware’s operations, aiming to compromise a more extensive range of potential victims.

    The connection between Golddigger and Gigabud becomes clearer when examining their historical development. In January 2023, CRIL discovered a Gigabud campaign impersonating government entities to target users in Thailand, the Philippines, and Peru. By June 2023, Golddigger, another Android banking trojan, emerged, targeting Vietnamese users under the guise of a government entity.

    Recent analyses have highlighted significant similarities between the Golddigger and Gigabud malware. The source code of both strains shows notable overlap, suggesting that they may originate from the same Threat Actor (TA). This shared code and strategy indicate a coordinated approach in their malicious campaigns.

    Phishing Tactics and Geographic Expansion

    CRIL’s research has identified various phishing sites designed to distribute Gigabud malware. These sites mimic the Google Play Store and pose as legitimate South African Airways and Ethiopian Airlines apps.

    Golddigger and Gigabud campaign (Source: Cyble)

    The use of such impersonation tactics reflects the malware’s expansion into new target regions, including South Africa and Ethiopia.

    Moreover, Gigabud malware has been observed impersonating Mexican banking institutions, such as “HeyBanco,” and Indonesian government applications, including “M-Pajak.” Fraudulent login pages for these institutions are created to trick users into entering their sensitive credentials, thus compromising their personal and financial information.

    The technical aspects of Gigabud malware reveal further similarities with Golddigger. Recent samples of Gigabud employ the Virbox packer, a technique also used by Golddigger. The Virbox packer obfuscates the malware’s true nature, making it more challenging for security solutions to detect and analyze the threat.

    One of the critical similarities between Golddigger and Gigabud is the use of the native file “libstrategy.so.” This file is integral to the malware’s ability to interact with the user interface elements of targeted banking applications. The presence of this file in both malware strains highlights the shared tools and techniques employed by the attackers.

    Gigabud’s latest versions incorporate an impressive number of API endpoints—32, up from just 11 in earlier versions. These endpoints facilitate a range of malicious activities, including uploading recorded face videos, SMS messages, stolen bank details, and more. The addition of these features reflects an ongoing effort by the TA to enhance the malware’s functionality and effectiveness.

    Recent samples of Gigabud have also shown a continued use of the “libstrategy.so” library, which is crucial for interacting with UI components on infected devices.

    Golddigger and Gigabud share similar library (Source: Cyble)

    This library includes parsed UI element IDs for various targeted banking applications and lock pattern windows from different mobile devices. The malware uses this information to execute malicious actions, such as locking and unlocking devices and targeting specific UI elements to steal financial data.

    Visual Evidence, Analysis, and Mitigation Strategies 

    To illustrate the extent of this overlap, consider the visual evidence from recent analyses. Figures highlight the phishing sites used to distribute Gigabud, such as those impersonating South African Airways and Ethiopian Airlines. Additionally, images of fake login pages for Mexican and Indonesian institutions reveal how Gigabud attempts to deceive users into revealing their credentials.

    Technical figures further demonstrate the use of common libraries and API endpoints. For instance, the comparison of old and new Gigabud samples shows how the malware’s code has evolved while retaining core similarities. The use of the Retrofit library for Command and Control (C&C) communication, along with consistent API endpoints, confirms the connection between newer and older versions of Gigabud.

    The investigation into Gigabud and Golddigger malware highlights a significant overlap, suggesting that the same TA is behind both strains. The recent increase in Gigabud’s activity, coupled with the shared techniques and tools, highlighted a sophisticated campaign employed by threat actors. The malware’s expansion into new regions and its continuous enhancement of features indicate a coordinated effort to target a broader audience.

    To protect against these persistent threats, users are advised to implement robust cybersecurity measures. These include activating biometric security features such as fingerprint or facial recognition, being cautious with links received via SMS or email, ensuring that Google Play Protect is enabled, and keeping devices, operating systems, and applications up to date. By following these best practices, users can better defend themselves against threats posed by Android malware like Golddigger and Gigabud.

    Source: Read More

    Hostinger
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleDOJ Charges Nashville Man for Helping North Koreans Get U.S. Tech Jobs
    Next Article Security Giant ADT Confirms Data Breach, Customer Info Leaked on Dark Web

    Related Posts

    Machine Learning

    Salesforce AI Releases BLIP3-o: A Fully Open-Source Unified Multimodal Model Built with CLIP Embeddings and Flow Matching for Image Understanding and Generation

    May 16, 2025
    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 16, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Back in BlackEnergy *: 2014 Targeted Attacks in Ukraine and Poland

    Development

    Paginate Multiple Eloquent Models with the Union Paginator Package

    Development

    This AI Paper Explores the Extent to which LLMs can Self-Improve their Performance as Agents in Long-Horizon Tasks in a Complex Environment Using the WebArena Benchmark

    Development

    ETH Zurich Researchers Unveil New Insights into AI’s Compositional Learning Through Modular Hypernetworks

    Development

    Highlights

    abPOA – adaptive banded Partial Order Alignment

    February 20, 2025

    abPOA is an extended version of Partial Order Alignment (POA) that performs adaptive banded dynamic…

    Fixing Focus Visibility Issues for ADA Compliance and Discovering PowerMapper Testing Tool

    February 12, 2025

    How to use chatgpt4o to redesign your website

    April 25, 2025

    SEC’s CETU: A Dedicated Task Force to Safeguard Investors from Cyber Fraud

    February 25, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.