BankBot Impersonates Apps, Targets Android Users in Asia

25 Sep 2025

A sophisticated cybercrime campaign is currently targeting Android users in Indonesia and Vietnam by deploying banking trojans disguised as legitimate government and payment applications. Known as BankBot, this operation has been active since around August 2024, utilizing a network of over 100 domains to infiltrate user devices. The trojans convincingly emulate official applications such as the M-Pajak tax payment system and digital identity verification services, tricking users into downloading malicious APK files.

Decoy Applications and Domain Infrastructure

The threat actors behind the BankBot campaign have expertly crafted replicas of these essential applications to deceive users. By masquerading as official pages on platforms like the Google Play Store, they can lure unsuspecting victims into downloading harmful software. DomainTools analysts have identified the extensive network supporting this campaign, which utilizes more than 100 domains to maintain the appearance of legitimacy and to divert attention away from their true malicious intentions.

WebSocket-Based Delivery and Evasion Techniques

Central to the success of the BankBot operation is its use of an advanced delivery mechanism based on WebSocket technology. This tactic leverages the Socket.IO library to transmit payloads in a way that evades conventional detection methods. When users attempt to download what they believe to be a legitimate app, the threat actors employ a technique that emits a continuous stream of data fragments, which are assembled in memory on the user's device. This approach bypasses traditional security controls by disguising the malware distribution as encrypted real-time traffic, thereby circumventing static URL crawlers.

Upon the issuance of the download command, the site triggers an invisible download that appears authentic to both the user and many security systems. This method ensures the efficient delivery of the malicious code while minimizing the risk of detection during the download process.

Implications for Users and Security

The emergence of such sophisticated evasion techniques highlights the ongoing evolution of cyber threats targeting mobile platforms. For users in affected regions, the risk of financial information theft is significant, as the malicious APKs installed on their devices are specifically designed to extract banking credentials and other sensitive data. Security professionals recommend increased vigilance and the use of trusted sources when downloading applications.

As these cybercriminal operations continue to evolve, it becomes imperative for both users and cybersecurity practitioners to stay informed and proactive. The adaptability of the BankBot campaign suggests a need for ongoing updates to traditional security measures to effectively counteract these advanced threats.

Top charts for Mobile Android

uTorrent

uTorrent

Latest update uTorrent download for free for Windows PC or Android mobile

5
1032 reviews
7508647
downloads
Zona

Zona

Latest update Zona download for free for Windows PC or Android mobile

4
614 reviews
1735873
downloads
WinRAR

WinRAR

Streamline file management with fast compression, secure your documents, and save space.

5
735 reviews
746826
downloads
Minecraft

Minecraft

Shape environments, explore vast worlds, and survive against monsters with endless creativity.

5
750 reviews
497554
downloads

Comments (0)

No comments yet. Be the first to comment!