ERMAC 3.0 Android Trojan Source Code Leak Exposes Major Flaws

Source Code Leak Exposes Android Trojan ERMAC 3.0 Targeting 700+ Financial Apps with Major Security Flaws

  • Researchers revealed a new version of the Android banking trojan ERMAC 3.0, which targets over 700 financial and cryptocurrency apps.
  • ERMAC 3.0 shows expanded data theft methods, including improved form injection and updated control panels.
  • The full source code and technical makeup of ERMAC, including its backend and frontend infrastructure, were publicly exposed online.
  • Security teams highlighted major security weaknesses in the Malware’s infrastructure, such as hardcoded credentials and insecure admin access.
  • These discoveries provide ways for defenders to detect and disrupt ERMAC 3.0’s activities.

Cybersecurity researchers have analyzed the Android banking trojan known as ERMAC 3.0, describing its inner workings and identifying serious flaws in the malware’s system. The trojan affects over 700 banking, shopping, and cryptocurrency apps, using advanced tactics to steal data from victims’ mobile devices.

- Advertisement -

Hunt.io reported that this new 3.0 version enhances how it targets apps and collects user information. The researchers were able to access the source code for the malware-as-a-service (MaaS) platform, including its backend built on PHP and Laravel, a React-based frontend, a Golang exfiltration server, and an Android builder tool. According to Hunt.io, “The newly uncovered version 3.0 reveals a significant evolution of the malware, expanding its form injection and data theft capabilities to target more than 700 banking, shopping, and cryptocurrency applications.”

ERMAC was first documented by ThreatFabric in September 2021. It has been linked to an actor called DukeEugene and shares origins with other banking malware like Cerberus and BlackRock. The investigation also found that ERMAC code was passed down and modified in other malwares like Hook (a variant of ERMAC 2.0), Pegasus, and Loot.

The exposed infrastructure lets operators manage victim devices and access stolen information using a “backend command and control server,” while a frontend panel issues commands and views data. Additional features include a Golang exfiltration server for exporting stolen files and a builder tool to create custom malware for campaigns. The Android implant, written in Kotlin, specifically avoids devices located in countries of the Commonwealth of Independent States (CIS).

ERMAC 3.0 introduced encrypted communications, extra form injection methods, and a fully updated management panel. However, Hunt.io found major weaknesses including “a hardcoded JWT secret and a static admin bearer token, default root credentials, and open account registration on the admin panel.” These issues mean defenders can more easily track and disrupt operations by recognizing these flaws.

- Advertisement -

For more technical details, Hunt.io published their full report here.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

DOJ seeks retrial for Tornado Cash dev on key charges

U.S. Attorney Jay Clayton has requested a retrial for Tornado Cash developer Roman Storm...

Ledger Integrates with Babylon Labs for Bitcoin Vaults

Bitcoin self-custody startup Babylon Labs has partnered with hardware wallet giant Ledger to secure...

Hackers Target AI Agent Security in New Attacks

AI Agents that automate tasks like sending emails or moving data are creating a...

Winklevoss Twins Shift $130M Bitcoin to Gemini Wallets

Gemini founders Tyler and Cameron Winklevoss transferred approximately $130 million in Bitcoin to the...

Bitcoin ETF inflows return while altcoin funds see outflows

US spot Bitcoin ETFs snapped a two-day outflow streak with a net inflow of...

Must Read

17 Best Cryptocurrency Wallets

If you are looking for a list with the best cryptocurrency wallets, then you've landed on the right page. Cryptocurrency, as we all know,...