Ginp banking Trojan now spurs victims to lose credentials via fake SMS

Kaspersky researchers have identified a new version of the Ginp banking Trojan, first discovered by the company’s analyst in 2019. Apart from the standard functions of Android-focused bankers – capacities to intercept and send SMS, perform window overlays – the new resurfaced version involves a highly unconventional function to insert fake text messages into the Inbox of a regular SMS app.

These messages appear under the guise of reputable vendors informing users about an undesired event (blocked account access, for example). To prevent this, the user is requested to open the application. Once victims do that, the Trojan overlays the original window and asks them to input the credentials for a credit card or a bank account. As a result, their payment details are handed over to cybercriminals.

“Ginp is simple, but efficient – and effective. And the rate at which it evolves and acquires new capabilities is concerning. While this attack has so far only been seen in Spain, based on our previous experience, this Trojan could begin to emerge in other countries as well; Android users need to be on alert,” says Alexander Eremin, security expert at Kaspersky.

To reduce the risk of being exposed to Ginp or other banking Trojans, Kaspersky experts recommend that people:

  • Only download apps from the official Google Play Store
  • Pay attention to what permissions apps requests – they shouldn’t be asking for access to SMS
  • Install an antivirus solution on your phone, like Kaspersky Antivirus & Security for Android


Be the first to comment

Leave a Reply

Your email address will not be published.


This site uses Akismet to reduce spam. Learn how your comment data is processed.