SikkahBot Malware Targets Bangladeshi Students

Published:

spot_img

New Android Malware SikkahBot Targets Students in Bangladesh

Overview of SikkahBot

A newly uncovered Android malware, known as SikkahBot, is specifically aimed at students in Bangladesh, masquerading as official applications from the Bangladesh Education Board. This alarming malware campaign has been detected by Cyble Research and Intelligence Labs (CRIL) since July 2024.

Distribution Techniques

SikkahBot is primarily spread through shortened URLs, which often appear innocuous at first glance. Links such as bit[.]ly/Sikkahbord, apped[.]short[.]gy, and downloadapp[.]website/tyup[.]apk are common vectors used by attackers. These links are likely distributed through smishing (SMS phishing) attacks that trick potential victims into downloading seemingly legitimate apps that are actually malicious APK files disguised as scholarship applications from government entities.

Malicious Functionality

Once installed on a device, these fake applications prompt users to log in with their Google or Facebook credentials and require personal information like name, department, and institution. Furthermore, they exploit mechanisms to obtain users’ financial details, demanding wallet numbers, PINs, and payment methods. After providing this information, victims receive a deceptive message indicating that a representative will contact them soon, allowing the malware to operate discreetly in the background.

Permissions Abuse

What distinguishes SikkahBot is its aggressive control over Android permissions. From the moment of installation, it encourages users to grant extensive access rights, including the Accessibility Service, SMS permissions, call management, and the capability to overlay other apps. These permissions give SikkahBot considerable control over the device, amplifying its potential to exploit user data.

Upon activation, the malware displays a counterfeit homepage filled with manipulated images of students reportedly receiving scholarships. This tactic is a part of its social engineering efforts aimed at establishing credibility.

Advanced Data Interception

SikkahBot takes additional measures to gather sensitive data by registering a broadcast receiver that intercepts all incoming SMS messages. It specifically looks for keywords related to widely-used mobile banking services like bKash, Nagad, and MYGP, along with associated service numbers. Captured messages are then transmitted to an attacker-controlled Firebase server at update-app-sujon-default-rtdb[.]firebaseio.com.

Exploitation of Banking Credentials

The malware’s use of the Accessibility Service for nefarious purposes is particularly concerning. When it detects user activity on banking applications, it automatically retrieves credentials from its server and attempts to autofill login details, effectively bypassing user input.

If the user is not currently using these banking apps, SikkahBot can initiate USSD transactions. It achieves this by receiving USSD codes and SIM slot information from its command server and executing the necessary calls, all while interacting with response prompts. This capability allows for transactions to occur without an internet connection, making it especially dangerous in low-connectivity situations.

Evasion Techniques and Variants

Despite its concerning features, SikkahBot variants show surprisingly low detection rates on platforms like VirusTotal. This low visibility is attributed to its obfuscation techniques, with CRIL discovering over ten distinct samples. Newly developed versions incorporate advancements that enhance automation and sophisticated command execution methods.

The combination of phishing tactics, automated banking actions, and offline USSD transactions makes SikkahBot an especially effective weapon for financial fraud targeted at unsuspecting students, according to CRIL’s analysis.

Protective Recommendations

To combat threats like SikkahBot, CRIL emphasizes the need for better mobile security awareness and proactive defensive measures. Here are some vital recommendations for users:

  • Install Apps from Trusted Sources: Only download applications from reputable platforms such as the Google Play Store.
  • Avoid Suspicious Links: Steer clear of shortened URLs or unfamiliar links received via SMS or social media.
  • Limit App Permissions: Do not grant Accessibility or overlay permissions unless absolutely necessary.
  • Enable Multi-Factor Authentication (MFA): This adds an extra layer of security for financial applications.
  • Use Mobile Security Software: Employ solutions offering real-time threat detection.
  • Keep Software Up to Date: Regularly update your Android OS and apps to address known vulnerabilities.
  • Report Suspicious Activity: Inform your bank immediately and consider performing a factory reset if needed.

Cyble’s Threat Intelligence Platform continues to track evolving threats like SikkahBot, aiming to provide early detection, infrastructure monitoring, and threat attribution. As digital fraud becomes increasingly sophisticated, maintaining vigilance and practicing good cybersecurity hygiene is crucial.

spot_img

Related articles

Recent articles

New Android Malware Uses Gemini AI to Evade Detection and Stay Persistent

The Rise of PromptSpy: A New Era of Android Malware A Breakthrough in Malware Evolution Recently, ESET researchers unveiled PromptSpy, marking a significant milestone in mobile...

CRESCENTHARVEST Campaign Deploys RAT Malware Against Iran Protest Supporters

Ravie LakshmananFeb 19, 2026Cyber Espionage / Data Security New Cyber Espionage Campaign Targeting Iranian Protesters Recent findings from cybersecurity specialists have unveiled a campaign known as...

International Relations Committee Honors South Africa’s Re-Election to the UN Human Rights Council

South Africa's Role on the United Nations Human Rights Council Briefing from the Department of International Relations Today, the Portfolio Committee on International Relations and Cooperation...

Jaggaer VP: UAE’s New eInvoicing Regulation Will Offer More Than Just Compliance

The Future of Finance: Embracing eInvoicing in the UAE As the UAE gears up to embrace eInvoicing by July 2026, organizations are standing at a...