Android malware uses VNC to give attackers hands-on access
Klopatra是一种伪装成IPTV和VPN应用的安卓银行木马和远程访问木马(RAT),已感染欧洲超3000台设备。它可实时监控屏幕、捕捉输入、模拟手势导航,并具备隐藏的VNC模式。研究人员称其由土耳其语网络犯罪集团开发,用于窃取银行凭证、复制剪贴板内容、清空账户并收集加密货币钱包信息。该恶意软件通过名为“Modpro IP TV + VPN”的分发器传播,并采用多种反分析机制以规避检测。 2025-10-1 18:45:28 Author: www.bleepingcomputer.com(查看原文) 阅读量:2 收藏

Android malware uses VNC to give attackers hands-on access

A new Android banking and remote access trojan (RAT) dubbed Klopatra disguised as an IPTV and VPN app has infected more than 3,000 devices across Europe.

Klopatra is described as a powerful trojan that can monitor the screen in real time, capture input, simulate gesture navigation, and features a hidden Virtual Network Computing (VNC) mode.

Researchers at cybersecurity company Cleafy say that the new trojan does not appear to be connected to any documented Android malware families and appears to be the project of a Turkish-speaking cybercrime group.

Klopatra was developed to steal banking credentials via overlay attacks, exfiltrate clipboard content and keystrokes, drain accounts over VNC, and collect cryptocurrency wallet app info.

A stealthy, evasive threat

The malware infiltrates victims’ devices through a dropper app called “Modpro IP TV + VPN,” which is distributed outside of the official Google Play platform for Android.

The Klopatra installation process
The Klopatra installation process
Source: Cleafy Labs

Klopatra integrates Virbox, a commercial-grade code protector that obstructs reverse-engineering and analysis, uses native libraries to reduce its Java/Kotlin footprint, and also NP Manager string encryption in recent builds.

Cleafy reports that the malware features several anti-debugging mechanisms, runtime integrity checks, and emulator detection capabilities, to ensure it’s not running in an analysis environment.

Klopatra abuses Android’s Accessibility service to grant itself additional permissions, capture user inputs, simulate taps and gestures, and monitor the victim’s screen for passwords and other sensitive information.

Prompt to give Accessibility permission
Prompt to give Accessibility permission
Source: Cleafy Labs

One key feature is a black-screen VNC mode that allows operators to perform actions on the infected device while it appears idle (with a locked screen) to the victim.

This mode supports all the required remote actions for performing manual bank transactions, like simulating taps on defined screen coordinates, swiping up/down, and long-pressing.

The malware checks if the device is charging or if the screen is off to determine the ideal moment to activate this mode without the user realizing it.

Commands sent by the operators to Klopatra
Commands sent by the operators to Klopatra
Source: Cleafy Labs

To avoid detection, Klopatra also contains a hardcoded list of package names corresponding to popular Android antivirus products, and attempts to uninstall them.

Hardcoded list of AV products the malware attempts to disable
Hardcoded list of AV products the malware attempts to disable
Source: Cleafy Labs

Operator exposure

Based on language artifacts and notes about development and monetization, Cleafy researchers believe that Klopatra is operated by a Turkish threat actor.

The researchers exposed multiple command and control (C2) points that appear connected to two campaigns, which count 3,000 unique infections.

Daily Klopatra infections
Daily Klopatra infections
Source: Cleafy Labs

Although the operators of the malware use Cloudflare to hide their digital tracks, a misconfiguration exposed origin IP addresses, which allowed linking the C2 servers to the same provider.

Since March 2025, when Klopatra first appeared in the wild, there have been 40 distinct builds, a sign of active development and quick evolution for the new Android trojan.

Android users are advised to avoid downloading APK files from obscure websites, reject Accessibility Service permission requests, and keep Play Protect active on their device.

Picus BAS Summit

The Security Validation Event of the Year: The Picus BAS Summit

Join the Breach and Attack Simulation Summit and experience the future of security validation. Hear from top experts and see how AI-powered BAS is transforming breach and attack simulation.

Don't miss the event that will shape the future of your security strategy


文章来源: https://www.bleepingcomputer.com/news/security/android-malware-uses-vnc-to-give-attackers-hands-on-access/
如有侵权请联系:admin#unsafe.sh