• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • COVID-19 Update
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • Latest News
  • About Us
    SEARCH
Mobility, Network Security, News

A New Malware Strain Can Steal Google Authenticator Codes, Report Says

Cybersecurity researchers have discovered a new version of an Android malware that can extract and steal one-time passcodes.

March 9, 2020 Zachary Comeau Leave a Comment

Malware Google Authenticator

Cybersecurity researchers have discovered a new version of an Android malware that can extract and steal one-time passcodes generated through a Google two-factor authentication tool.

According to ZDNet, the malware, called Cerberus, can intercept passcodes generated through Google Authenticator, a mobile app that’s used as two-factor authentication layer that works by generating six-to-eight-digit codes that end users enter to access certain accounts.

ZDNet cited Dutch security firm ThreatFabric, who said they’ve spotted an Authenticator OTP-stealing capability in recent samples of Cerberus.

Cerberus, a banking trojan, was originally discovered in June 2019, ZDNet reported:

“Abusing the Accessibility privileges, the Trojan can now also steal 2FA codes from Google Authenticator application,” the ThreatFabric team said.

“When the [Authenticator] app is running, the Trojan can get the content of the interface and can send it to the [command-and-control] server,” they added.

ThreatFabric said this new feature is not yet live in the Cerberus version advertised and sold on hacking forums.

“We believe that this variant of Cerberus is still in the test phase but might be released soon,” researchers said.

Read Next: Hackers Are Now Targeting Your Google Advertising Account

Per ZDNet, ThreadFabric noted that this new version of the malware is very advanced and is now part of very few strains of malware that can bypass multi-factor authentication solutions.

Cerberus is now considered a superior class of malware, similar to remote access trojans (RAT).

These RAT features allow Cerberus operators to remotely connect to an infected device, use the owner’s banking credentials to access an online banking account, and then use the Authenticator OTP-stealing feature to bypass 2FA protections on the account — if present.

ThreatFabric researchers believe the Cerberus trojan will most likely use this feature to bypass Authenticator-based 2FA protections on online banking accounts, however, there’s nothing stopping hackers from bypassing Authenticator-based 2FA on other types of accounts. This includes email inboxes, coding repositories, social media accounts, intranets, and others.

According to ThreadFabric, this variant of Cerberus is believed to still be in the test phase, but could soon be released on the dark web.

“Having an exhaustive target list including institutions from all over the world, combined with its new RAT capability, Cerberus is a critical risk for financials offering online banking services,” the firm said.

Tagged With: Google Authenticator, Malware

Related Content:

  • Microsoft Basic Auth Prepare: Microsoft Begins Disabling Basic Auth in Exchange…
  • Zoom Phone Provider Exchange Zoom Launches New Phone Provider Exchange Program
  • Google G Suite, Workspace Google Workspace Getting Two New Security Features
  • Sharp NEC PE456USL Sharp NEC Display Solutions Launches New Short-throw Projector

Free downloadable guide you may like:

  • Windows 11Blueprint Series: Upgrading to Windows 11

    Upgrading end users to Windows 11 could be one of the most challenging tasks IT has to face in the coming years. Although the new version is touted to provide many benefits, including some important security enhancements, when and how to roll out the upgrade will vary significantly by organization.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Uber Advanced Technologies Group Drives its Business Forward

The guiding principle for the new Uber meeting room redesign was “invisible comfort” to ensure that everyone could maximize productivity.

Windows 11
Blueprint Series: Upgrading to Windows 11

Upgrading end users to Windows 11 could be one of the most challenging tasks IT has to face in the coming years. Although the new version is touted...

The State of the IT Department in 2022

The role of the IT professional has shifted from one that supports the business to one that is deserving of a seat at the table when it comes to ma...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2022 Emerald X, LLC. All rights reserved.