BRATA Android Malware Evolves Into an APT
The BRATA Android banking Trojan is evolving into a persistent threat with a new phishing technique and event-logging capabilities.
An Android-based banking Trojan known as BRATA (short for Brazilian RAT Android) has evolved to incorporate new phishing techniques and capabilities to acquire GPS, overlay, SMS, and device management permissions.
The Italian mobile security company Cleafy reported in a blog post this week that these changes align with an advanced persistent threat (APT) pattern of activity.
“Threat actors behind BRATA now target a specific financial institution at a time, and change their focus only once the targeted victim starts to implement consistent countermeasures against them,” the blog post explained. “Then, they move away from the spotlight, to come out with a different target and strategies of infections.”
The new variant, which is targeting the EU region by posing as specific bank applications, can also now perform event logging through its ability to sideload a second-stage piece of malware from its command-and-control (C2) server.
Ability to Bypass MFA
The threat actors operating the new malware variant (BRATA.A) are also expanding their capabilities to include a methodology for potentially bypassing SMS-based multifactor authentication (MFA).
The updated phishing technique can mimic a targeted bank’s login page, part of the group’s strategy to acquire personal information to be used later for social-engineering purposes.
“Once installed, the pattern of the attack is similar to other SMS stealers,” according to the blog post. “This consists in the malicious app asking the user to change the default messaging app with the malicious one to intercept all incoming messages.”
Credential harvesting is common in banking Trojans and stealer malware, but bypassing MFA is a bit more complicated.
“This functionality, along with BRATA’s ability to remain undetected for prolonged periods of time, could potentially classify the threat actors as an APT,” says Nicole Hoffman, senior cyber threat intelligence analyst at Digital Shadows.
BRATA Actors Thinking About Future Development
From the perspective of John Bambenek, principal threat hunter at Netenrich, the ability to request additional permissions on the device indicates what the attackers are thinking as far as future development.
“Not all the new features are actively collecting and transmitting data to the attacker, but future updates can change that,” he says. “The actors are spending real effort to make sure they can maximize their success. Banks are constantly evolving, so attackers must do so also.”
He adds that because mobile malware is typically still just an app, consumers can protect themselves by only installing apps from approved app stores and be wary when apps are asking for banking credentials.
“Financial institutions need to invest in behavioral analytics to detect stolen credential use against their online presence to prevent fraud against their consumers,” Bambenek says.
In a statement provided to Dark Reading, the Cleafy Threat Intelligence team notes BRATA’s evolution suggests the threat actors plan to diversify their business model, and consequently its income.
Cleafy’s hypothesis is that BRATA is sold as malware-as-a-service (MaaS) to different groups, since the firm is tracking many variants of this malware hitting different countries across the globe.
“It has been observed that they started refactoring part of the malware, in order to tailor it according to the requests of their customers,” the statement reads.
Evolution of a Trojan
In January, Cleafy discovered the group behind BRATA manipulating Android’s factory reset to prevent victims from discovering or reporting and preventing illicit wire transfers. At that point, the malware campaigns were targeting Italian banks.
During the last year, BRATA was delivered through sideloading techniques, not through the official Google Play Store.
Cleafy recommends users pay particular attention to downloading apps from untrusted websites or whenever SMS is required to install an application.
“However, considering the Android 13 restriction for sideloaded apps, we do not exclude that in the future BRATA will be also delivered through official stores, like other famous malware have been trying to do in recent months (e.g. Sharkbot, Teabot etc.),” the statement continues.
Kaspersky first discovered BRATA in 2019 when it was simply spyware and targeted at users in Brazil.