Will MazarBOT be the straw that breaks Android’s back?

Will MazarBOT be the straw that breaks Android’s back?

The deep access granted to banking Trojan MazarBOT for Android shows exactly why app development and maintenance fall far short of the sophisticated threats they are posed with.

That’s according to Jan Vidar Krey, Head of Development at Norwegian app security firm Promon, who found the most alarming part of the malware was not its ability to penetrate and compromise an Android device, but that the existence of this strain was not protected against since it was first identified on the Dark Web several months ago.

“Android’s recent history has been marked by its inability to withstand malware attacks so this single attack does not come as a surprise, even if the Trojan’s ability to stealthily fly under the radar of most Android antivirus software may come as a shock. In reality, external antivirus software is ineffective as it is able to understand only a matrix of existing threats and overlooks targeted, sophisticated threats.”

The malware is packaged in hyperlinked text messages, which if followed could install TOR software and introduce man-in-the-middle attacks by sending information back to a proxy server. All device operations can then be monitored, messages can be sent to premium rate numbers and two-factor authentication codes can be accessed and used to circumvent online banking protection.

Krey commented:

“With the ability to connect to different networks, access different platforms and download apps from different developers, Android devices are extremely flexible in what they can do. However, they are porous to external intrusions as a result of this ease-of-access. Once malware has cracked the device’s root, it can perform a frightening number of actions.

“Unfortunately, Android security developers have failed to keep up with the threat of Android malware’s growing mutations, which, by becoming increasingly complex, have outgrown traditional means of protection: antivirus and patching. These methods serve as poorly timed reactions to a specific vulnerability, rather than a proactive step to protect the integrity of the device as a whole. Dealing with threats as they occur is crucial to ensuring adequate security for your mobile device.”

Krey advised:

“While methods such as two-factor authentication can help to an extent, if the malware has been designed to target banking applications – as it is suspected MazarBOT has – there’s no second line of defence. Instead of using crutches such as antivirus or two-factor, it is vital that security is developed at the level of the application itself.

“As it stands, the responsibility for applications has been diffusely passed between Android developers, app developers and, finally, the end user. Time and again, this dynamic has been proven ineffective and a rethink of traditional means of protecting Android applications is long, long overdue,” Krey concluded.

[su_button url=”http://promon.co/” target=”blank” style=”flat” background=”#df2027″ color=”#ffffff” size=”10″ radius=”0″ icon=”icon: arrow-circle-right”]Click here to find out more about Promon[/su_button]

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Most cyber attacks in Middle East involve spyware

Positive Technologies has analysed the attacks carried out on individuals in Middle Eastern countries between 2022…

Android device migration

The exchange of smartphones has a significant complication in transferring data to the new device. To overcome this problem, Cloning applications were introduced to overcome this problem, which will clone the entire device to the new one…

Trellix expands their XDR platform

Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), has announced the expansion of its XDR platform.

Nozomi reveal global cyber threat in latest report

The latest report from Nozomi Networks Labs finds malware, botnet activity and the Russia/Ukraine war impacted the threat landscape in 2022. 
malware

Peer Software will monitor malware patterns

Peer Software today announced the formation of a strategic alliance with Pulsar Security to continuously analyse malware attack patterns.

Peer Software will monitor malware patterns

Peer Software today announced the formation of a strategic alliance with Pulsar Security to continuously analyse malware attack patterns.
Cybereason

Cybereason identifies new malware variants

Cybereason, the XDR company, announced that it has discovered previously unidentified malware variants being leveraged in two separate Iranian
Malware Detection

Qualys adds Malware Detection

Qualys, cloud-based IT, security and compliance solutions,  announced it has added malware detection to its cloud-based Remote Endpoint Protection offer
shutterstock_437844922

Financial threats in 2020: These are the key predictions from Kaspersky

In 2020, financially motivated cyberthreat actors may start to target investment apps and other areas according to Kaspersky in the financial sector
Scroll to Top