VB2019 paper: Geost botnet. The story of the discovery of a new Android banking trojan from an OpSec error

OpSec mistakes are what lead to many malware discoveries, but in the case of the Geost

Android

botnet the mistake was a really interesting one: its operators were using another botnet, HtBot, to manage infected devices, not realising that researchers were analysing some HtBot-infected hosts.

This led researchers Sebastian García, Maria Jose Erquiaga and Anna Shirokova to the discovery of Geost, a large

Android

botnet mostly targeting users of online banking in Russia.

htbot-infra.jpg

Discovery of the Geost botnet. A monitored bot of the HtBot malware was used by the Geost botmasters. First, the Geost botmaster connected to the HtBot network; second, the HtBot network relayed the data to our bot; third, our bot sent the traffic to the Internet; fourth, the botmaster accessed the Geost C&C server on the Internet.


Today we publish the researchers’ paper on Geost in both

HTML

and

PDF

format. We have also uploaded the video of Sebastian and Anna presenting at VB2019 in London to our

YouTube

channel.

VB2019-conference-paper.jpg

Geost botnet. The story of the discovery of a new Android banking trojan from an OpSec error




Read the paper (HTML)


Download the paper (PDF)




Comments

Leave a Reply

Your email address will not be published. Required fields are marked *