#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

29 C
Dubai
Thursday, November 27, 2025
HomeTopics 1Advanced Persistent ThreatInvestigation Report: Android/BankBot-YNRK Mobile Banking Trojan

Investigation Report: Android/BankBot-YNRK Mobile Banking Trojan

Date:

Related stories

spot_imgspot_imgspot_imgspot_img

A new and highly sophisticated mobile banking Trojan, dubbed Android/BankBot-YNRK, has emerged, targeting Android users across multiple regions. The malware, analyzed in-depth by Cyfirma, demonstrates advanced evasion, persistence, and credential theft techniques that could have severe implications for individuals and organizations worldwide.

A Trojan Built for Full Control

According to the investigation, Android/BankBot-YNRK is not just another banking Trojan. It combines traditional credential-stealing behavior with modern automation and remote-control capabilities, giving attackers almost complete control over infected devices. Once installed, the malware can mute all notifications and audio alerts, disguise itself as legitimate apps like Google News, and operate silently in the background.

The malware abuses Android’s Accessibility Services—intended to assist users with disabilities—to automate taps, navigate screens, and approve permissions without user consent. This feature allows it to extract sensitive data such as banking credentials, cryptocurrency wallet keys, and one-time passwords (OTPs). It can even forward calls, intercept SMS messages, and mimic legitimate banking interfaces to trick users into entering login details.

Targeting Both Banks and Cryptocurrencies

The threat actors behind Android/BankBot-YNRK appear to have cast a wide net. The malware’s command-and-control (C2) servers deliver a long list of targeted financial institutions across Southeast Asia, including MoMo, Vietin Bank, Maybank, DBS, and ICICI, among others. It doesn’t stop at traditional banks—cryptocurrency wallets such as MetaMask, Trust Wallet, SafePal, Coinomi, and Exodus are also explicitly targeted.

Using automated interface manipulation, the Trojan can access wallet apps, read displayed content like seed phrases or balances, and even initiate unauthorized transactions. This blend of banking and crypto theft capabilities makes it one of the more versatile and dangerous mobile Trojans seen in recent months.

Built to Stay Hidden

Android/BankBot-YNRK employs a range of anti-analysis and persistence mechanisms to stay undetected:

  • It checks for virtual environments to evade sandbox analysis.
  • It profiles devices by manufacturer, model, and screen resolution—tailoring its behavior to specific devices like Samsung, Oppo, and Xiaomi.
  • It registers recurring background jobs to maintain persistence even after a reboot.
  • It requests device administrator rights to prevent uninstallation.

To avoid raising suspicion, it changes its appearance, using Google News branding and legitimate-looking content within a browser window, while continuing malicious activities in the background.

Command and Control Network

The malware communicates with its C2 server at ping[.]ynrkone[.]top, sending device information, app lists, and user data. The C2 infrastructure also serves as a “chatroom” for controlling multiple infected devices simultaneously. Researchers observed additional malicious domains, including foundzd[.]vip and e1in2[.]top, suggesting a distributed infrastructure likely managed by organized cybercriminal groups.

What Makes It Different

While many Android Trojans rely on overlays or phishing screens, BankBot-YNRK goes further by integrating device automation and accessibility abuse to perform real actions on behalf of the user. Its stealth, persistence, and cross-platform financial targeting signal a growing convergence between mobile banking malware and crypto theft operations—a trend that cybersecurity experts expect to intensify.

10 Recommended Actions for Security Teams

  1. Educate users to download apps only from trusted sources such as the Google Play Store.
  2. Review app permissions carefully, especially for apps requesting Accessibility or Device Admin rights.
  3. Deploy mobile threat defense solutions capable of detecting obfuscated malware like those using nmm-protect.
  4. Implement Mobile Device Management (MDM) to block installation of apps from unknown sources.
  5. Update all Android devices to version 14 or higher to benefit from stricter accessibility security policies.
  6. Block known C2 domains and suspicious ports (8181, 8989) at the firewall level.
  7. Conduct periodic mobile threat hunting to identify infected devices or suspicious traffic.
  8. Restrict developer options and USB debugging on managed or enterprise-owned devices.
  9. Encourage password hygiene and MFA for banking and crypto accounts to minimize credential compromise.
  10. Isolate and reset any suspected infected devices, preserving forensic evidence for investigation.

For professionals in the Middle East and Africa, where mobile banking and fintech adoption are rapidly increasing, such malware poses a growing threat. Cybercriminals are increasingly adapting their campaigns to exploit local financial platforms and crypto exchanges. Organizations should therefore emphasize continuous awareness training through platforms like Saintynet Training and maintain regular security audits via Saintynet Cybersecurity.

The Bigger Picture

Android/BankBot-YNRK exemplifies the next generation of mobile cybercrime-highly automated, financially motivated, and engineered to blend seamlessly into legitimate digital ecosystems. As both personal banking and cryptocurrency management continue to migrate to mobile platforms, security awareness and proactive defenses are no longer optional-they are critical.

According to Cyfirma’s investigation, this malware family remains active, with new variants expected. Security professionals and users alike must remain vigilant, update their devices, and treat every unfamiliar app request with caution.

Conclusion:

Android/BankBot-YNRK is a stark reminder that the smartphone in your hand is as much a target as your corporate network. With its ability to manipulate device behavior, steal financial data, and mimic trusted apps, it represents a serious and evolving risk to both individuals and enterprises. Staying secure means staying informed through regular training, awareness, and a commitment to proactive mobile defense.

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here