Webinar with Dr. Mike Saylor — Mobile Device Forensics: Challenges and Solutions (April 23, 2024)
Summary
The Android banking trojan Vultur has resurfaced with enhanced functionalities and advanced methods for evasion, including encrypting its communication channels, using dynamically decrypted payloads and masquerading as legitimate applications. The new version gives operators the ability to remotely manipulate mobile devices and collect user information. This infection still requires at least three (3) victim interactions, including the initial phone call to the threat actors from the initial SMS text, interaction with a subsequent SMS text that contains a link, and installation of the fake McAfee app that has the malware payload.
Technical Details
Vultur’s infection cycle begins with an SMS alert concerning an unauthorized financial transaction and urging the recipient to call a provided number for assistance. If the recipient calls the number, they are coerced into following a link provided in a subsequent SMS, leading to a webpage offering a malicious version of the McAfee Security app that contains the ‘Brunhilda’ malware dropper. Once installed, the app decrypts and executes three Vultur-associated payloads (two APKs and one DEX file), which then exploit Accessibility Services, trigger remote control systems, and establish contact with the command and control (C2) server.
The new Vultur malware retains several capabilities from previous versions, including screen recording, keylogging, and remote access via AlphaVNC and ngrok, enabling real-time surveillance and control for malevolent actors. New functionality adds expanded file management capabilities, including download, upload, deletion, installation, and file reconnaissance on the targeted device; and Accessibility Services to execute various user interactions like clicks, scrolling, and swiping gestures.
Evasion capabilities include stratagems, including blocking specific apps and displaying customized notifications to mislead users; overrides Keyguard to circumvent lock screen security, granting unrestricted access to the device; and encrypted C2 communications (AES + Base64 encryption) and dynamically decrypted payloads.

IOCs
File Hash (SHA-256):
C2 Servers:
Dropper Distribution URLs:
Recommendations
References
A Cybersecurity Risk Assessment is a structured and comprehensive procedure implemented within an organization to identify, evaluate, and manage potential risks, threats, or vulnerabilities originating from the organization’s internal elements. This assessment thoroughly examines various aspects of the organization, including its operations, processes, systems, and activities. The primary objective is to assess the likelihood and potential consequences of internal risks, which can stem from human error, unintentional data leaks, or effective management practices.
In addition to playing a crucial role in promoting a culture of accountability and adopting an all-encompassing approach to risk assessment, risk assessments also contribute to continuous improvement within the organization. Organizations can mitigate risks and enhance operational efficiency and overall performance by recognizing and addressing weaknesses or vulnerabilities in internal processes and controls. This comprehensive approach to risk assessment contributes to the organization’s long-term resilience and ability to adapt to evolving challenges in the dynamic business landscape.
Grasping risk assessment strategies equips an organization with the tools to effectively detect and manage potential threats. It involves a balanced blend of quantitative analysis, which quantifies risks and their impacts, and qualitative techniques, which provide context and interpret the subtleties behind the numbers. This dual approach enriches an organization’s insight into its risk environment, paving the way for strategic, data-informed decisions that enhance overall security and stability amidst the ever-evolving risks in today’s business world.

https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-30r1.pdf
Practical risk assessment is vital for navigating the uncertainties impacting an organization’s goals. It involves a straightforward process to identify and manage risks that might compromise achieving strategic objectives. By understanding these risks and implementing a solid management process, an organization can minimize potential setbacks and reinforce its effectiveness. This involves developing a systematic approach to identify, prioritize, and address risks to preserve shareholder value and ensure the organization’s success and sustainability.
This process ensures that all relevant assets spanning different areas of the organization are accounted for and evaluated. By incorporating input from diverse departments, the assessment becomes more inclusive, capturing a broader spectrum of assets and potential risks. This comprehensive approach helps identify vulnerabilities and threats that may otherwise be overlooked if conducted in isolation.
In addition to deliberate attacks on firewalls and security systems, organizations must also be vigilant against unintentional actions by employees, such as deleting data or clicking malicious links, as well as hardware or system failures. External events like natural disasters or power outages can further exacerbate threats to information security. Organizations can comprehensively address potential risks to their digital assets and infrastructure by incorporating these considerations into the threat identification process.
Identifying threats involves several key steps to ensure comprehensive coverage:
This systematic approach ensures that resources are directed towards mitigating risks with the highest potential impact and likelihood of occurrence. Organizations can visually represent and prioritize risks by employing risk matrices, facilitating more precise identification of areas that demand immediate attention.

Credit ( techtarget.com )
Ensure that risk assessment findings are effectively communicated through tailored reports, accommodating varying levels of understanding, and emphasize the iterative nature of the process for continual improvement and adaptation within the organization.
Conducting and documenting IT risk assessments is indispensable in an organization’s risk management efforts. An effectively organized and thorough report captures the current state of an organization’s risk profile and acts as a guide for risk mitigation efforts. By tailoring the presentation of findings to the audience and emphasizing the continuous nature of risk assessment, organizations can better manage their risk landscape and enhance their overall security posture.
References
Ivanti. (n.d.). What is ITIL? – The Essential Guide to ITIL. Retrieved March 22, 2024, from https://www.ivanti.com/glossary/itil
Archibald, K. (n.d.). 5 IT risk management frameworks to consider for your program. OneTrust. Retrieved March 22, 2024 from https://www.onetrust.com/blog/5-it-risk-management-frameworks-to-consider-for-your-program/
Blackswan Cyber Fusion Center helps organizations to be flexible and scalable — enabling them to leverage a highly effective, 24/7, US-based Security Operations Center (SOC) at a low total cost of ownership (TCO), based on their business needs and risk profile.
From monitoring…to reporting and responding…to log retention…Blackswan’s CFC helps your organization stay secure.
Learn about how Blackswan Cyber Fusion Center can benefit your security posture more than traditional SOCs, while keeping costs manageable: http://www.blackswan-cybersecurity.com/cyber-fusion-center/

This fact sheet offers executive leaders an overview of the pressing threat posed by state-sponsored cyber actors from the People’s Republic of China (PRC) known as “Volt Typhoon.” In collaboration with the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), and various U.S. government and international counterparts, CISA issued a significant advisory on February 7, 2024. This advisory alerts cybersecurity defenders to Volt Typhoon’s activities, highlighting their infiltration of U.S. critical infrastructure networks. Their aim is to disrupt or dismantle critical services in times of heightened geopolitical tensions or potential military conflicts involving the United States and its allies. This poses a significant risk to businesses across the United States and allied nations.