The iBanking it is a banking Trojan which comes disguised as a security app for Appliances Android. The Trojan is distributed through attacks HTML injection.
Recently, Trojan's source code has leaked online through an underground forum, which has allowed too many cybercriminals to launch attacks using this malware.
The iBanking malware, once installed on a victim's phone, can spy on the user's communications. The bot allows an attacker to send fake SMS, redirect calls to any predefined phone number, record sounds using microphone device and steal other sensitive data such as call history and phonebook contacts.
According to a new report by its security researchers ESET, iBanking Trojan (Android / Spy.Agent.AF) is targeting Facebook users to trick them into downloading malware.
Malware uses an attack method JavaScript web injection to create a fake Facebook verification page and trick social network users like the one shown below:
The fake verification page asks users to enter its number mobile , in order to verify the authenticity of their Facebook account, and then presents the following page if the victim's mobile, runs Android.
The next fake page asks the victim to download an Android application from a QR code or using an SMS if for some reason he can not download it. Once downloaded and installed, the malware connects to the administration and control server which allows attackers to give it commands to execute on any infected device.
Since many banking sites use two-factor authentication and transaction licensing systems to avoid various threats, criminals began to develop malware such as iBanking to bypass two-factor authentication.
The iBanking Trojan can be used in conjunction with any malware to do injection malicious code on a web page and is generally used to redirect the incoming SMS messages of the infected device.
It is always important to download third-party applications only from trusted sources. You can do this simply by setting the menu / Applications / and turning off "unknown sources".