The Vultur trojan steals bank credentials but asks for permissions to do far more damage down the line.

After remaining available for more than two weeks, a malicious two-factor authentication (2FA) application has been removed from Google Play — but not before it was downloaded more than 10,000 times. The app, which is fully functional as a 2FA authenticator, comes loaded with the Vultur stealer malware that targets and swoops down on financial data.

Users with the malicious application, straightforwardly called “2FA Authenticator,” are advised by researchers at Pradeo to delete it from their device immediately since they still remain at risk — both from banking-login theft and other attacks made possible by the app’s extensive overpermissions.

The threat actors developed an operational and convincing application to disguise the malware dropper, using open-source Aegis authentication code injected with malicious add-ons. That helped it spread via Google Play undetected, according to a Pradeo report released on Thursday.

Infosec Insiders Newsletter

“As a result, the application is successfully disguised as an authentication tool, which ensures it maintains a low profile,” the report added.

Vultur Banking Trojan Gobbles Down Permissions

Once downloaded, the app installs Vultur banking trojan, which steals financial and banking data on the compromised device — but can do much more.

First detected by analysts at ThreatFabric last March, the Vultur remote access trojan (RAT) malware was the first of its kind found to use keylogging and screen recording as its primary tactic for banking-data theft, enabling the group to automate the process of harvesting credentials and scale.

Faux 2FA app takes flight with Vultur trojan. Source: Pradeo.

“The actors chose to steer away from the common HTML overlay strategy we usually see in other Android banking trojans: this approach usually requires more time and effort from the actors in order to steal relevant information from the user. Instead, they chose to simply record what is shown on the screen, effectively obtaining the same end result,” ThreatFabric said at the time.

The scam 2FA authenticator also asks for device permissions beyond what was disclosed in the Google Play profile, the Pradeo team said.

Those sneaky, elevated privileges allow the attackers to perform various functions beyond the standard banking-trojan fare, such as: Accessing user location data, so attacks can be targeted at specific regions; disabling the device lock and password security; downloading third-party applications; and taking over control of the device, even if the app is shut down, the report explained.

Pradeo uncovered another dirty trick the malicious 2FA pulled by grabbing the SYSTEM_ALERT_WINDOW permission, which gives the app the ability to change other mobile apps’ interfaces. As Google itself explained, “Very few apps should use this permission; these windows are intended for system-level interaction with the user.”

Once the device is fully compromised, the app installs Vultur, “an advanced and relatively new kind of malware that mostly targets online banking interface to steal users’ credentials and other critical financial information,” the report said.

The team at Pradeo reported that while the researchers submitted their disclosure to Google Play, nevertheless the malicious 2FA Authenticator app loaded with the banking trojan remained available for 15 days.

Check out our free upcoming live and on-demand online town halls – unique, dynamic discussions with cybersecurity experts and the Threatpost community.