The infamous Ginp banking Trojan, which acquired the ability to insert fake text messages into the inbox of a regular SMS app back in March, has now acquired a new functionality—one that takes advantage of the current COVID-19 pandemic.
Once downloaded on a victim’s phone, the Ginp Trojan can receive a command from the attacker to open a webpage titled “Coronavirus Finder”, which claims there are people nearby infected with the virus.
In order to learn where these individuals are, the victim is asked to pay €0.75. If the victim agrees, he or she is transferred to a payment page. Once the payment details have been entered, however, the victim is neither charged this sum nor does he or she receive any information about those “infected”. Instead, their credit card information has just been handed over to cybercriminals.
Ginp is a Trojan that has rapidly evolved since it first appeared, consistently acquiring new capabilities. In addition, while in the past the targets have primarily been residents of Spain, the name of this latest version suggests the attackers are planning to target other countries.
“Cybercriminals have, for months, attempted to take advantage of the coronavirus crisis by launching phishing attacks and creating coronavirus-themed malware,” says Alexander Eremin, security expert at Kaspersky.
“This is the first time, though, we’ve seen a banking Trojan attempting to capitalise on the pandemic. It’s alarming, particularly since Ginp is such an effective Trojan. We encourage Android users to be particularly vigilant at this time—pop-ups, unfamiliar webpages, and spontaneous messages about coronavirus should always be viewed skeptically.”