<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p><img src="http://cdn2.hubspot.net/hubfs/2548414/Blog%20images/marcher.png" alt="" title="marcher.png" width="458" style="width: 458px; display: block; margin-left: auto; margin-right: auto;"></p> <p>Marcher is an evolving Android-based banking Trojan, <a href="https://securityintelligence.com/marcher-mobile-bot-adds-uk-targets-steps-up-banking-fraud-capabilities/" target="_blank">changing in scope and capabilities</a> since first seen in 2013. Spreading through phishing emails and websites, it prompts the victim to download “security updates” from third party app stores. It has also been found to spread through malicious apps on the Google Play Store itself.<!--more--></p> <p>Using social engineering, this malware lures victims to access their bank accounts through fake text notifications that reference unexpected transactions. Once the user enters their login credentials, the stolen data is tested then sent to the criminal’s Command and Control server.</p> <p>Because the malware has administrative control over the device, it can hinder several popular mobile security applications and bypass two-factor authentication that a user set up with their banks.</p> <p>To generate even more revenue, criminals can have the infected device secretly call and message premium toll numbers they own.</p> <p><a href="https://blog.fortinet.com/2016/11/18/android-malware-masquerades-as-banking-app-part-ii" target="_blank">Lately</a>, Marcher has been seen targeting both banking credentials and credit card information through overlays on Google Play, Facebook, Skype, and Instagram applications.</p> <p>ThreatSTOP customers are protected from Marcher if they have TS Crit targets enabled in their policies.</p></span>