GodFather is an Android banking malware that uses virtualization to mimic legitimate applications and abuses accessibility services and other permissions to evade detection and exfiltrate sensitive data. First identified in 2020, GodFather targets nearly 500 banking applications, cryptocurrency wallets, and exchanges worldwide; however, its virtualization-based attacks have primarily focused on several Turkish financial institutions. This capability enables threat actors to steal banking credentials and other sensitive account information. [1][2]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Mobile | T1453 | Abuse Accessibility Features |
GodFather has abused the accessibility service to prevent the user from uninstalling GodFather, to exfiltrate Google Authenticator one-time passwords and to steal credentials.[2] |
|
| Mobile | T1437 | .001 | Application Layer Protocol: Web Protocols | |
| Mobile | T1429 | Audio Capture |
GodFather has requested for the |
|
| Mobile | T1616 | Call Control |
GodFather has requested for the |
|
| Mobile | T1624 | Event Triggered Execution |
GodFather has executed when victims utilize their trusted banking apps, as the malware redirects the victim to using a malicious version of the banking app.[1] |
|
| Mobile | T1646 | Exfiltration Over C2 Channel |
GodFather has exfiltrated sensitive information over C2.[1][2] |
|
| Mobile | T1617 | Hooking |
GodFather has used the Xposed hooking framework to intercept HTTP requests and responses, capturing and exfiltrating sensitive information, such as credentials.[1] |
|
| Mobile | T1629 | Impair Defenses |
GodFather has intercepted API returns from banking apps that detect malicious services, and modifies the methods to return back an empty list hiding the presence of the malware and other active services.[1] |
|
| .001 | Prevent Application Removal |
GodFather has abused the accessibility service to prevent the user from uninstalling itself.[2] |
||
| Mobile | T1630 | Indicator Removal on Host |
GodFather has requested for the |
|
| Mobile | T1544 | Ingress Tool Transfer |
GodFather has downloaded Google Play Store, Google Play services and Google Services Framework APK to a virtual folder.[1] |
|
| Mobile | T1417 | Input Capture |
GodFather has the captured information about the device's screen to include detailed tap events.[1] |
|
| .001 | Keylogging |
GodFather has intercepted and recorded sensitive information from the application to include user credentials. GodFather has also leveraged a deceptive overlay that tricks users into submitting their device lock credentials which are captured.[1] |
||
| Mobile | T1516 | Input Injection |
GodFather has abused the Accessibility Service to mimic victims’ actions and to redirect victims to its StubActivity when the victims attempt to use the original, legitimate banking application.[1] |
|
| Mobile | T1655 | .001 | Masquerading: Match Legitimate Name or Location |
GodFather has imitated Google Play Protect, a security application pre-installed on all Android devices, and its functionalities, such as scanning the device and requesting for the accessibility service.[2] |
| Mobile | T1575 | Native API |
GodFather has hooked onto the |
|
| Mobile | T1406 | Obfuscated Files or Information |
GodFather has obfuscated its Android manifest file with irrelevant permissions and manifest strings.[1] |
|
| Mobile | T1660 | Phishing |
GodFather has generated fake notifications to lure the victim to phishing pages.[2] |
|
| Mobile | T1636 | .003 | Protected User Data: Contact List | |
| .004 | Protected User Data: SMS Messages |
GodFather has requested for the |
||
| Mobile | T1603 | Scheduled Task/Job |
GodFather has utilized a timer to initiate a WebSocket connection.[1] |
|
| Mobile | T1582 | SMS Control |
GodFather has requested for the |
|
| Mobile | T1418 | Software Discovery |
GodFather has gathered a list of installed applications.[1][2] |
|
| Mobile | T1426 | System Information Discovery |
GodFather has the ability to gain remote control of the victim device and to gather data associated with the device, including battery level, sound settings, and device brightness.[1] GodFather has also obtained the phone's state, including network information, phone number, and serial number.[2] |
|
| Mobile | T1422 | System Network Configuration Discovery |
GodFather has accessed the device’s current cellular network information, including the phone number and the serial number.[2] |
|
| Mobile | T1670 | Virtualization Solution |
GodFather has used virtualization to create a separate virtual environment that mimicked legitimate banking and cryptocurrency applications.[1] |
|