Usually, i don't enable screen lock so it will be strange for me to see that lock screen, but if it's not from link/download malware, how the virus can reach my device?
I read all the comments above but still find it hard to believe that the virus is out there since last June and google didn't announce about it as a potential high risk danger neither update its auth app with more security measures.
I don't think there is anything Google can update in Authenticator to stop this particular virus, it's not the weakness of the secret keys being exploited, it's Android itself being hacked. I think they should release a security update for android, and they probably will since this news is bubbling up in mainstream news outlets.
Now that I look at the whitepaper again, it says a lot of things about stealing Google Authenticator secrets, but after reading the other whitepaper at https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html, I see it can make other kinds of fake/phishing input screens, not just fake lock screens. This potentially lets it steal secret data from other apps like Authy. But the Cerberus botnet commanders (it makes a botnet) would have to be interested in stealing Authy secrets before making an "overlay" (fake screen) for that. I think the reason they decided to create a new whitepaper about Cerberus and Google Authenticator is that this new Cerberus can download anything from your filesystem and can make Teamviewer connections to android, so like a remote control. The old version can't do this. Also neither version can be uninstalled which is a common thing for viruses to implement.
These screens are the old version of Cerberus. Old cerberus was released (made available for selling) in June 2019, New Cerberus was released January 2020. As you can see, it can also steal OTPs and other codes by presenting these fake login/data entry screens. My screenshot resolution is a little bad. I don't know how it does an "overlay attack" or if there is a way to tell whether a given screen is fake, but these screens were pasted from the whitepaper, as example fake screens that Cerberus is known to use. In both versions, some Flash Player screen is going to ask you for accessibility privileges in a dialog like this:
Don't give suspicious Flash Player-lookalike apps any permissions. Now would be a good time to reiterate, don't give any apps permissions that they don't need. If someone is foolish enough to give this app permissions, it will give itself even more privileges, and turn off Play Protect. Then it (both old and new Cerberus) will add your device to a botnet which can send these commands (pasted from the whitepaper):
Command | Description |
push | Shows a push notification. Clicking on the notification will result in launching a specified app |
startApp | Starts the specified application |
getInstallApps | Gets the list of installed applications on the infected device |
getContacts | Gets the contact names and phone numbers from the address book on the infected device |
deleteApplication | Triggers the deletion of the specified application |
forwardCall | Enables call forwarding to the specified number |
sendSms | Sends a text message with specified text from the infected device to the specified phone number |
startInject | Triggers the overlay attack against the specified application |
startUssd | Calls the specified USSD code |
openUrl | Opens the specified URL in the WebView |
getSMS | Gets all text messages from the infected device |
killMe | Triggers the kill switch for the bot |
updateModule | Updates the payload module (Note: I think this updates the virus) |
So you see they can just StartInject any app they want including other authenticators and bam - you get a fake phishing screen. If you're tech savvy then you can check any packages on your phone and make sure there aren't any with these SHA256 hashes:
App name | Package name | SHA256 hash |
Flash Player | com.uxlgtsvfdc.zipvwntdy | 728a6ea44aab94a2d0ebbccbf0c1b4a93fbd9efa8813c19a88d368d6a46b4f4f |
Flash Player | com.ognbsfhszj.hqpquokjdp | fe28aba6a942b6713d7142117afdf70f5e731c56eff8956ecdb40cdc28c7c329 |
Flash Player | com.mwmnfwt.arhkrgajn | ffa5ac3460998e7b9856fc136ebcd112196c3abf24816ccab1fbae11eae4954c |
Flash Player | com.wogdjywtwq.oiofvpzpxyo | 6ac7e7ed83b4b57cc4d28f14308d69d062d29a544bbde0856d5697b0fc50cde4 |
Flash Player | com.hvdnaiujzwo.fovzeukzywfr | cfd77ddc5c1ebb8498c899a68ea75d2616c1c92a0e618113d7c9e5fcc650094b |
Flash Player | com.gzhlubw.pmevdiexmn | 3f2ed928789c200e21fd0c2095619a346f75d84f76f1e54a8b3153385850ea63 |
Edit: some more Cerberus hashes:
c3adb0a1a420af392de96b1150f0a23d8826c8207079e1dc268c07b763fe1af7
4ff95cadf83b47d1305f1deb4315e6387c4c0d58a0bdd12f74e866938c48baa5
9d4ce9cce72ec64761014aecbf1076041a8d790771fa8f8899bd3e2b2758281d
Confirmation that they are targeting cryptocurrency services that we use:
Always better to have knowledge of what viruses do so we know what to expect from them, right?