SikkahBot Malware Targets Bangladeshi Students

Published:

spot_img

New Android Malware SikkahBot Targets Students in Bangladesh

Overview of SikkahBot

A newly uncovered Android malware, known as SikkahBot, is specifically aimed at students in Bangladesh, masquerading as official applications from the Bangladesh Education Board. This alarming malware campaign has been detected by Cyble Research and Intelligence Labs (CRIL) since July 2024.

Distribution Techniques

SikkahBot is primarily spread through shortened URLs, which often appear innocuous at first glance. Links such as bit[.]ly/Sikkahbord, apped[.]short[.]gy, and downloadapp[.]website/tyup[.]apk are common vectors used by attackers. These links are likely distributed through smishing (SMS phishing) attacks that trick potential victims into downloading seemingly legitimate apps that are actually malicious APK files disguised as scholarship applications from government entities.

Malicious Functionality

Once installed on a device, these fake applications prompt users to log in with their Google or Facebook credentials and require personal information like name, department, and institution. Furthermore, they exploit mechanisms to obtain users’ financial details, demanding wallet numbers, PINs, and payment methods. After providing this information, victims receive a deceptive message indicating that a representative will contact them soon, allowing the malware to operate discreetly in the background.

Permissions Abuse

What distinguishes SikkahBot is its aggressive control over Android permissions. From the moment of installation, it encourages users to grant extensive access rights, including the Accessibility Service, SMS permissions, call management, and the capability to overlay other apps. These permissions give SikkahBot considerable control over the device, amplifying its potential to exploit user data.

Upon activation, the malware displays a counterfeit homepage filled with manipulated images of students reportedly receiving scholarships. This tactic is a part of its social engineering efforts aimed at establishing credibility.

Advanced Data Interception

SikkahBot takes additional measures to gather sensitive data by registering a broadcast receiver that intercepts all incoming SMS messages. It specifically looks for keywords related to widely-used mobile banking services like bKash, Nagad, and MYGP, along with associated service numbers. Captured messages are then transmitted to an attacker-controlled Firebase server at update-app-sujon-default-rtdb[.]firebaseio.com.

Exploitation of Banking Credentials

The malware’s use of the Accessibility Service for nefarious purposes is particularly concerning. When it detects user activity on banking applications, it automatically retrieves credentials from its server and attempts to autofill login details, effectively bypassing user input.

If the user is not currently using these banking apps, SikkahBot can initiate USSD transactions. It achieves this by receiving USSD codes and SIM slot information from its command server and executing the necessary calls, all while interacting with response prompts. This capability allows for transactions to occur without an internet connection, making it especially dangerous in low-connectivity situations.

Evasion Techniques and Variants

Despite its concerning features, SikkahBot variants show surprisingly low detection rates on platforms like VirusTotal. This low visibility is attributed to its obfuscation techniques, with CRIL discovering over ten distinct samples. Newly developed versions incorporate advancements that enhance automation and sophisticated command execution methods.

The combination of phishing tactics, automated banking actions, and offline USSD transactions makes SikkahBot an especially effective weapon for financial fraud targeted at unsuspecting students, according to CRIL’s analysis.

Protective Recommendations

To combat threats like SikkahBot, CRIL emphasizes the need for better mobile security awareness and proactive defensive measures. Here are some vital recommendations for users:

  • Install Apps from Trusted Sources: Only download applications from reputable platforms such as the Google Play Store.
  • Avoid Suspicious Links: Steer clear of shortened URLs or unfamiliar links received via SMS or social media.
  • Limit App Permissions: Do not grant Accessibility or overlay permissions unless absolutely necessary.
  • Enable Multi-Factor Authentication (MFA): This adds an extra layer of security for financial applications.
  • Use Mobile Security Software: Employ solutions offering real-time threat detection.
  • Keep Software Up to Date: Regularly update your Android OS and apps to address known vulnerabilities.
  • Report Suspicious Activity: Inform your bank immediately and consider performing a factory reset if needed.

Cyble’s Threat Intelligence Platform continues to track evolving threats like SikkahBot, aiming to provide early detection, infrastructure monitoring, and threat attribution. As digital fraud becomes increasingly sophisticated, maintaining vigilance and practicing good cybersecurity hygiene is crucial.

spot_img

Related articles

Recent articles

Cybersecurity Alert: Wi-Fi Hacks, npm Worms, DeFi Heists & 15 More Critical Threats

The Ongoing Cybersecurity Race: Latest Threats and Innovations In today’s world, where almost every device is connected, the need for vigilance in cybersecurity has never...

UK Cookie Compliance Campaign Achieves 95% Adherence Among Top Websites

UK Data Regulator Takes Action on Cookie Consent Compliance In a significant move to enhance data privacy, the Information Commissioner’s Office (ICO) in the UK...

Join Motorola Solutions at Intersec Dubai 2026!

04 Dec Motorola Solutions to Showcase Innovations at Intersec Dubai 2026 Intersec Dubai 2026 is poised to be a pivotal event for professionals in the...

Promising New Hydrogen Carrier Set to Transform Oman

Innovative Hydrogen Carrier Launched by Dutch Firms in Oman Collaboration in Green Hydrogen Technology In a significant advancement for the green hydrogen sector, two Netherlands-based companies,...