Qwizzserial Android Malware as Legitimate Apps Steals Banking Data & Intercepts 2FA SMS

A sophisticated Android malware campaign targeting banking credentials and two-factor authentication codes has emerged as a significant threat to users across Central Asia, particularly in Uzbekistan.

The malware, dubbed Qwizzserial, represents a dangerous evolution in mobile banking fraud, exploiting the region’s heavy reliance on SMS-based authentication systems for financial transactions.

Initially discovered in mid-2024, Qwizzserial remained relatively dormant before experiencing explosive growth in distribution and impact.

The malware operates by masquerading as legitimate applications, using deceptive names such as “Presidential Support,” “Financial Assistance,” and even mimicking established banking applications to lure unsuspecting victims into installation.

Group-IB analysts identified the malware during their investigation into related Android threats, noting its sophisticated distribution network that mirrors the well-documented Classiscam fraud infrastructure.

The campaign has infected approximately 100,000 users, with documented financial losses exceeding $62,000 within just three months of active operation.

google

The malware’s primary distribution vector is Telegram, where threat actors create convincing channels posing as government entities offering financial assistance programs.

The scale and sophistication of the operation suggests a well-organized criminal enterprise with defined roles including administrators, workers, malware developers, and specialized “vbivers” who verify stolen card details for fraudulent withdrawals.

Malware requests to disable battery optimization restrictions, and corresponding code (Source – Group-IB)

This structured approach has enabled the rapid scaling of infections across the target region, with new malware samples emerging at an increasingly frequent rate.

Technical Analysis of Infection Mechanism

Qwizzserial’s infection mechanism demonstrates careful engineering designed to maximize data theft while maintaining persistence on victim devices.

Upon installation, the malware immediately requests critical permissions essential to its operation:-

android.permission.READ_PHONE_STATE
android.permission.CALL_PHONE  
android.permission.RECEIVE_SMS
android.permission.READ_SMS

The application employs persistent permission requests, continuously prompting users until access is granted.

Once permissions are secured, victims are presented with a convincing interface requesting two phone numbers and complete banking card details including expiration dates.

Malware’s main activity layout in Uzbek (left) and translations in English (right), requesting for users to provide their personal and financial information (Source – Group-IB)

The malware’s data collection capabilities extend beyond initial user input. It systematically harvests existing SMS messages, packaging them into ZIP archives containing separate files for inbox, sent, and miscellaneous messages.

A sophisticated regex pattern identifies balance-related communications: new Regex("\\b(Balance|Balans|Summu|Summa|Summ|Dostupno|Izmenen|Vklad|Amount|Availab"), enabling targeted financial intelligence gathering.

Recent variants have evolved to include obfuscation techniques using NP Manager and Allatori Demo, while implementing improved persistence mechanisms that disable battery optimization restrictions.

The malware now utilizes HTTP POST requests to gate servers rather than direct Telegram API communication, demonstrating continuous development and refinement of its operational security measures.

Investigate live malware behavior, trace every step of an attack, and make faster, smarter security decisions -> Try ANY.RUN now

googlenews
Tushar Subhra Dutta
Tushar is a senior cybersecurity and breach reporter. He specializes in covering cybersecurity news, trends, and emerging threats, data breaches, and malware attacks. With years of experience, he brings clarity and depth to complex security topics.