Perseus Malware Targets Android Users via Note Apps in Turkey, Italy; Exploits Banking Data and More

Perseus: The New Android Banking Malware Exploiting Note Apps for Data Theft

Cybersecurity experts have recently identified a new Android malware family named Perseus, actively deployed to execute device takeovers and financial fraud. This sophisticated malware builds upon the foundations of earlier threats like Cerberus and Phoenix, evolving into a more versatile and potent platform for compromising Android devices. Perseus is primarily disseminated through dropper applications found on phishing websites, targeting users across various regions, with a notable focus on Turkey and Italy.

Origins and Evolution

Perseus traces its lineage to Cerberus, a notorious Android banking trojan first documented in August 2019. Cerberus exploited Android’s accessibility services to grant itself additional permissions, enabling it to steal sensitive data and credentials by overlaying fake screens atop legitimate applications. Following the public leak of Cerberus’s source code in 2020, several variants emerged, including Alien, ERMAC, and Phoenix. Perseus represents the latest evolution in this lineage, incorporating advanced features and expanding its capabilities.

Distribution Methods

The malware is distributed through seemingly innocuous applications, often masquerading as IPTV services. This tactic capitalizes on users’ interest in sideloading apps to access premium content, thereby reducing suspicion and increasing infection success rates. Notable examples of such dropper applications include:

– Roja App Directa (com.xcvuc.ocnsxn)
– TvTApp (com.tvtapps.live)
– PolBox Tv (com.streamview.players)

Once installed, these apps deploy the Perseus payload, initiating the malware’s operations.

Technical Capabilities

Perseus exhibits a range of functionalities that distinguish it from its predecessors:

1. Overlay Attacks and Keystroke Logging: The malware can intercept user inputs in real-time by displaying fraudulent interfaces over legitimate financial and cryptocurrency applications, thereby capturing sensitive credentials.

2. Remote Command Execution: Operators can issue commands via a command-and-control (C2) panel, enabling actions such as:

– Initiating near-real-time visual streams of the victim’s screen.

– Transmitting structured representations of the user interface to interact with elements programmatically.

3. Note Application Monitoring: A particularly insidious feature of Perseus is its ability to scan and extract contents from various note-taking applications, including:

– Google Keep

– Xiaomi Notes

– Samsung Notes

– ColorNote Notepad Notes

– Evernote

– Simple Notes Pro

– Simple Notes

– Microsoft OneNote (notably, the malware specifies the incorrect package name com.microsoft.onenote instead of the correct com.microsoft.office.onenote)

By monitoring these applications, Perseus aims to extract high-value personal or financial information that users may have stored in their notes.

Geographical Targeting

Campaigns distributing Perseus have primarily targeted users in Turkey, Italy, Poland, Germany, France, the United Arab Emirates, and Portugal. The malware’s operators have tailored their distribution methods and payloads to align with the specific contexts and languages of these regions, enhancing the effectiveness of their attacks.

Development Insights

Analysis of Perseus’s codebase suggests that the developers may have utilized large language models (LLMs) to assist in its creation. Indicators supporting this hypothesis include extensive in-app logging and the presence of emojis within the source code, which are atypical in manually written malware code. This approach reflects a broader trend in malware development, where threat actors leverage advanced tools to streamline the creation of more sophisticated threats.

Mitigation Strategies

To protect against threats like Perseus, users are advised to:

– Exercise Caution with App Sources: Avoid downloading applications from unverified sources or third-party websites.

– Verify App Authenticity: Before installation, research the app’s developer and read user reviews to ensure legitimacy.

– Monitor App Permissions: Be wary of apps requesting excessive permissions, especially those related to accessibility services.

– Keep Devices Updated: Regularly update your device’s operating system and applications to benefit from the latest security patches.

– Utilize Security Solutions: Employ reputable mobile security software to detect and prevent malware infections.

By adopting these practices, users can significantly reduce the risk of falling victim to sophisticated malware like Perseus.