December 17, 2015 By Larry Loeb 2 min read

Russian antivirus firm Dr. Web has found some new Android malware it has dubbed ZBot, according to a report from the security researchers. Its name may stem from the fact that it’s similar to the Zeus Trojan and targets mobile banking customers. It appears to have been going after users in Russia since February 2015.

About ZBot

There are three variants of the malware: Android.ZBot.1.origin, Android.ZBot.2.origin and Android.ZBot.3.origin. The latter two are newer than the first and most likely were designed to evade antivirus and other detection programs.

The injection program looks like a normal Android utility, usually the Google Play app. The infected app is placed on a website and downloaded by users who think they are getting the original software. After installation, the malware tries to obtain administrator privileges via an error message that mandates the unwitting user reboot the system.

If this ploy fails initially, the malware will display a phishing page where victims are instructed to enter payment card information. This phishing page is also displayed even if the malware gains admin privileges but only for a limited time.

How the Malware Works

Let’s say the malware does trick the user into granting admin privileges. It is then launched when the mobile device is rebooted. Cybercriminals can then command ZBot to send SMS messages to specified numbers, make phone calls, track location via GPS and display phishing pages on top of specified banking applications, SecurityWeek reported.

When a banking application is detected, a specially designed phishing page downloaded from the command-and-control (C&C) center of the malware is displayed on top of it. The malware is designed to target the customers of numerous banks that operate in Russia, and the page it displays is specific to the detected bank.

Some of these banks will allow users to carry out transactions via SMS message so the malware may send special SMS commands that will take money directly from bank accounts and send it to the cybercriminals. Users are usually not even aware this has happened, according to Dr. Web, because the malware will intercept confirmation messages.

Users Must Remain Alert

Security researchers discovered that all of ZBot’s modifications are controlled by different servers, the addresses of which are stored in a special database of the malicious program. They have detected more than 20 C&C servers for the malware — and noted that at least 15 are still active.

Dr. Web claimed that the Trojan was flagged more than 25,000 times during the observation period. And with servers still active, the malware will likely remain a threat — especially if it moves beyond its existing geo-targeted locations.

They also make the ominous warning that the bot may spread. “We cannot exclude the possibility that fraudsters will not limit their targets to Russian users only, and not expand the geography of these attacks to other countries including Europe and the United States,” the Dr. Web researchers said.

It seems the way around this one is to only load programs from trusted sites. There are also some remediation methods Dr. Web recommended for users on any operating system.

More from

FYSA — VMware Critical Vulnerabilities Patched

< 1 min read - SummaryBroadcom has released a security bulletin, VMSA-2025-0004, addressing and remediating three vulnerabilities that, if exploited, could lead to system compromise. Products affected include vCenter Server, vRealize Operations Manager, and vCloud Director.Threat TopographyThreat Type: Critical VulnerabilitiesIndustry: VirtualizationGeolocation: GlobalOverviewX-Force Incident Command is monitoring activity surrounding Broadcom’s Security Bulletin (VMSA-2025-0004) for three potentially critical vulnerabilities in VMware products. These vulnerabilities, identified as CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226, have reportedly been exploited in attacks. X-Force has not been able to validate those claims. The vulnerabilities…

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today