Malware, Application security

TgToxic malware evolves with advanced anti-detection techniques

cyber crime assessment , security awareness , malware detection

Cybersecurity researchers have identified a new variant of the TgToxic Android malware, also known as ToxicPanda, which highlighted its evolving threat as attackers use public reporting to their advantage, according to The Hacker News.

Originally documented by Trend Micro in early 2023, TgToxic functions as a banking trojan that targeted cryptocurrency wallets, banking, and financial apps. Since July 2022, it primarily targeted mobile users in Taiwan, Thailand, and Indonesia but has since expanded to Italy, Portugal, Hong Kong, Spain, and Peru.

The malware is believed to be operated by a Chinese-speaking threat actor. According to Intel 471, the updated TgToxic variant uses dropper APK files, likely distributed via SMS messages or phishing websites. The malware now also features improved emulator detection and updates to its command-and-control URL generation, allowing it to avoid detection.

Notably, the malware uses community forums such as Atlassian to host encrypted strings that direct to the actual C2 server, making it easier for attackers to change servers without updating the malware.

Recent updates include a domain generation algorithm, which enhances its resilience by allowing the creation of new domains if existing ones are blocked. TgToxic's advanced tactics include obfuscation, payload encryption, and anti-emulation techniques.

Despite its sophistication, Google confirmed no known infected apps on Google Play, with Google Play Protect automatically shielding users from detected threats.

An In-Depth Guide to Application Security

Get essential knowledge and practical strategies to fortify your applications.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds