Loading cryptocurrency prices...

ERMAC 3.0 Android Trojan Source Code Leak Exposes Major Flaws

Source Code Leak Exposes Android Trojan ERMAC 3.0 Targeting 700+ Financial Apps with Major Security Flaws

  • Researchers revealed a new version of the Android banking trojan ERMAC 3.0, which targets over 700 financial and cryptocurrency apps.
  • ERMAC 3.0 shows expanded data theft methods, including improved form injection and updated control panels.
  • The full source code and technical makeup of ERMAC, including its backend and frontend infrastructure, were publicly exposed online.
  • Security teams highlighted major security weaknesses in the Malware’s infrastructure, such as hardcoded credentials and insecure admin access.
  • These discoveries provide ways for defenders to detect and disrupt ERMAC 3.0’s activities.

Cybersecurity researchers have analyzed the Android banking trojan known as ERMAC 3.0, describing its inner workings and identifying serious flaws in the malware’s system. The trojan affects over 700 banking, shopping, and cryptocurrency apps, using advanced tactics to steal data from victims’ mobile devices.

- Advertisement -

Hunt.io reported that this new 3.0 version enhances how it targets apps and collects user information. The researchers were able to access the source code for the malware-as-a-service (MaaS) platform, including its backend built on PHP and Laravel, a React-based frontend, a Golang exfiltration server, and an Android builder tool. According to Hunt.io, “The newly uncovered version 3.0 reveals a significant evolution of the malware, expanding its form injection and data theft capabilities to target more than 700 banking, shopping, and cryptocurrency applications.”

ERMAC was first documented by ThreatFabric in September 2021. It has been linked to an actor called DukeEugene and shares origins with other banking malware like Cerberus and BlackRock. The investigation also found that ERMAC code was passed down and modified in other malwares like Hook (a variant of ERMAC 2.0), Pegasus, and Loot.

The exposed infrastructure lets operators manage victim devices and access stolen information using a “backend command and control server,” while a frontend panel issues commands and views data. Additional features include a Golang exfiltration server for exporting stolen files and a builder tool to create custom malware for campaigns. The Android implant, written in Kotlin, specifically avoids devices located in countries of the Commonwealth of Independent States (CIS).

ERMAC 3.0 introduced encrypted communications, extra form injection methods, and a fully updated management panel. However, Hunt.io found major weaknesses including “a hardcoded JWT secret and a static admin bearer token, default root credentials, and open account registration on the admin panel.” These issues mean defenders can more easily track and disrupt operations by recognizing these flaws.

- Advertisement -

For more technical details, Hunt.io published their full report here.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Altcoins Surge as Fed Signals Rate Cut; Bitcoin Eyes $130K Upside

Altcoins, including Ethereum and Solana, led gains as cryptocurrency markets rebounded mid-week. Federal Reserve signals...

Bitcoin Stabilizes as Musk Sparks Rally, Fed Signals Dovish Turn

Bitcoin steadied at around $112,000 after recent market volatility. Elon Musk made a bullish move...

Ripple, Absa Bank Partner to Offer Digital Asset Custody in Africa

Ripple partners with South African bank Absa to offer digital asset custody services to...

AI Threatens India Call Centers, But US Jobs Unlikely to Return

AI chatbots are reducing the need for human call center agents in India.An Indian...

Trump Eyes Ban on China Cooking Oil; Sadot, Aussie Oilseed Surge

The U.S. plans to halt cooking oil imports from China after China stopped buying...
- Advertisement -

Must Read

Top 10 Best Crypto Advertising Networks

So, you are interested in promoting your crypto-related product or service but you don’t know how to go about it. Today we are going...