Marcher

The Marcher banking trojan is malicious software targeting Android devices, and it poses a significant threat to both mobile users and the developers of mobile banking apps. Marcher is an Android-based banking trojan that has been active for several years.

The Marcher banking trojan is malicious software targeting Android devices, and it poses a significant threat to both mobile users and the developers of mobile banking apps. Marcher is an Android-based banking trojan that has been active for several years. It primarily targets Android users, especially in Europe, and its main objective is to steal sensitive financial information, particularly login credentials for banking and financial apps. Marcher spreads through malicious apps, phishing campaigns, or disguising itself as legitimate apps or updates.

2023 Global Mobile Threat Report

Threats Posed by Marcher to Mobile Banking Apps

  • Data Theft: Marcher is designed to steal sensitive information stored on the user’s device. Sensitive information includes login credentials for mobile banking apps and other financial services, such as usernames and passwords.
  • Overlay Attacks: One of Marcher’s primary techniques is using overlay attacks. The trojan displays fake login screens on top of legitimate mobile banking apps. Unsuspecting users may enter their credentials into these fake interfaces, which are then captured by the trojan.
  • Keylogging: Marcher can capture keystrokes, including login information and other sensitive data entered by the user.
  • SMS Intercept: The trojan can intercept SMS messages on the infected device, including one-time passwords (OTPs) and transaction verification codes sent by mobile banking apps. Message interception allows attackers to bypass two-factor authentication measures.
  • Device Information Theft: Marcher can gather device-specific information, such as device identifiers, phone numbers, and system details. This information may be used for tracking and profiling users.
  • Remote Control: Marcher may connect to the attackers’ command and control (C2) server. This connection enables remote control of the infected device, allowing attackers to execute various commands, including unauthorized transactions.

Mitigating the Threat of Marcher

To protect your mobile banking app and its users from the Marcher banking trojan and similar threats, consider implementing the following security measures:

  • Regular Updates: Keep your mobile banking app and its dependencies up-to-date with the latest security patches and enhancements to address known vulnerabilities.
  • User Education: Educate users about the importance of downloading the official app from trusted sources, avoiding suspicious links or downloads, and being cautious with app permissions.
  • Multi-factor Authentication (MFA): Encourage users to enable MFA for their accounts to add an extra layer of security.
  • Real-time Monitoring: Implement real-time monitoring to detect and respond to suspicious activities within your app and network traffic.
  • Secure Coding: Follow secure coding practices to prevent vulnerabilities in your app’s code, including input validation, data encryption, and secure API communication.
  • Third-party Library Review: Carefully review and vet third-party libraries or components used in your app for potential security risks.
  • Collaborate with Security Experts: Work with cybersecurity experts to conduct security assessments, code reviews, and penetration testing to identify and address your app’s security weaknesses.
  • Incident Response Plan: Develop an incident response plan to respond to security incidents or breaches effectively.

By taking these precautions, you can help safeguard your mobile banking app and protect your users from the threats posed by the Marcher banking trojan and other evolving malware.

Learn More about Banking Trojan Families

Marcher is one of the principal families of banking trojans threatening mobile banking and financial apps. Learn more about other prominent banking trojan families:

Related Content

Receive Zimperium proprietary research notes and vulnerability bulletins in your inbox

Get started with Zimperium today