TeaBot malware slips back into Google Play Store to target US users

The TeaBot banking trojan was spotted once again in Google Play Store where it posed as a QR code app and spread to more than 10,000 devices.

This is a trick that its distributors used before, in January, and even though Google ousted these entries, it appears that the malware can still find a way into the official Android app repository.

According to a report from Cleafy, an online fraud management and prevention company, these applications are acting as droppers. They are submitted without malicious code and request minimal permissions, which makes it hard for Google’s reviewers to spot anything shady.

Also, the trojanized apps include the promised functionality, so user reviews on the Play Store are positive.

TeaBot fetcher app on the Play Store
TeaBot fetcher app on the Play Store (Cleafy)

Fetching the TeaBot payload

The In february, researchers found that TeaBot posed as an app named ‘QR Code & Barcode – Scanner’, which appears as a legitimate QR code scanning utility.

Upon installation, the app requests an update through a popup message, but contrary to the standard procedure imposed by the Play Store guidelines, the update is fetched from an external source.

Cleafy traced the download source back to two GitHub repositories belonging to the same user (feleanicusor), containing multiple TeaBot samples, uploaded on February 17, 2022.

TeaBot loading and infection process
TeaBot loading and infection process (Cleafy)

Once the victim accepts to install the update from non-trusted sources, TeaBot is loaded onto their device as a new app under the name ‘QR Code Scanner: Add-On’.

The new app launches automatically and requests the user to grant permission to use the Accessibility Services, to perform the following functions:

  • View the device’s screen and grab screenshots that expose login credentials, 2FA codes, SMS content, etc.
  • Perform actions such as auto-granting additional permissions in the background without requiring any user interaction.
Abuse of Accessibility Services
Abuse of Accessibility Services (Cleafy)

Google has introduced some security-minded API changes for the Accessibility Service in Android 12, but this remains the most commonly abused permission by banking trojans. After all, most Android phones are still running OS version 11 or older.

Expanded targeting scope

In the versions that circulated the Play Store in January 2021, analyzed by Bitdefender, TeaBot exited if it detected victim location in the United States.

Now, TeaBot is actively targeting users in the U.S. and has also added Russian, Slovak, and Chinese languages, indicating that the malware is eyeing a global victim pool.

New languages added in TeaBot's code
New languages added in TeaBot's code (Cleafy)

Possibly, the operators of TeaBot now feel that their tool is ready for larger-scale operations, having passed through a period of “testing” on smaller markets.

TeaBot's current victim heatmap
TeaBot's current victim heatmap (Cleafy)

Compared to early 2021 samples, the malware now features stronger string obfuscation and targets 500% more (from 60 to 400) banking, insurance, crypto wallet, and crypto exchange applications.

To minimize the chances of infection from banking trojans even when using the Play Store as your exclusive app source, keep the number of installed apps on your device at a minimum.

Also, whenever you install a new app on your device, monitor its battery consumption and network traffic volume for the first couple of days to spot any suspicious patterns.

Related Articles:

SoumniBot malware exploits Android bugs to evade detection

New Brokewell malware takes over Android devices, steals data

Vultur banking malware for Android poses as McAfee Security app

New Wpeeper Android malware hides behind hacked WordPress sites

PixPirate Android malware uses new tactic to hide on phones