TechBeware the Brokewell Trojan: Android's New enemy disguised as Chrome Update

Beware the Brokewell Trojan: Android's New enemy disguised as Chrome Update

In the world of Android, a new malicious software dubbed Brokewell has come to light. This banking trojan can hijack devices and pilfer login credentials for various applications, which could result in financial losses in the most severe instances. It sneaks into smartphones under the guise of being an update for Google Chrome.

Beware of false update information
Beware of false update information
Images source: © Pixabay, Threat Fabric, Dobreprogramy

The team at Threat Fabric has shed light on the threat. The banking trojan known as Brokewell falls into the category of info stealers, worming its way into victims' smartphones to extract specific data and relay it to the attackers' servers. The intel gathered in this manner is then used to facilitate further attacks or pave the way for commandeering social media accounts (with potential “Blik” scams on the horizon) or infiltrating bank accounts to embezzle funds.

As is often the case, users inadvertently contribute to the problem by not recognizing the falsified update notification. The perpetrators have mainly disseminated the Brokewell malware through spurious warnings about a supposedly critical Google Chrome update. Clicking on the prompt (effectively an advert that redirects the user) takes them to a bogus webpage, where they unknowingly download the malicious software.

Authentic (on the left) and fake (on the right) update information
Authentic (on the left) and fake (on the right) update information© Threat Fabric

In effect, the Brokewell Trojan gains access to all the phone's data and functions. This includes capabilities such as recording audio, capturing the screen, reading GPS location, making calls, sending SMS messages, installing additional software without the user's consent (likely also malicious, enabling further nefarious activities), and relaying any data from the phone to the attackers. Consequently, the smartphone is wholly "subjugated," unbeknownst to the user.

To sidestep similar hazards, it’s critical to exercise caution when downloading apps and updating those already on your device. The most prudent approach is to rely exclusively on official sources of distribution, namely, the Google Play Store, for both new downloads and app updates. In a statement to The Hacker News, Google has asserted that Android is equipped to detect known threats and unauthorized activities perpetrated by apps, thanks to Play Protect, even if the programs were acquired outside the Google Play Store.

Related content

© Daily Wrap
·

Downloading, reproduction, storage, or any other use of content available on this website—regardless of its nature and form of expression (in particular, but not limited to verbal, verbal-musical, musical, audiovisual, audio, textual, graphic, and the data and information contained therein, databases and the data contained therein) and its form (e.g., literary, journalistic, scientific, cartographic, computer programs, visual arts, photographic)—requires prior and explicit consent from Wirtualna Polska Media Spółka Akcyjna, headquartered in Warsaw, the owner of this website, regardless of the method of exploration and the technique used (manual or automated, including the use of machine learning or artificial intelligence programs). The above restriction does not apply solely to facilitate their search by internet search engines and uses within contractual relations or permitted use as specified by applicable law.Detailed information regarding this notice can be found  here.