Look out – this Android malware can take over your banking and crypto accounts

Android malware on phone
(Image credit: Shutterstock)

A new version of the ERMAC Android banking trojan has been released which allows the malware to target a wider range of applications to steal account credentials and cryptocurrency from.

In addition to new features, ERMAC 2.0 has also seen its price increase from $2,000 to $5,000 per month on dark web forums where cybercriminals purchase access to the malware to use in their cyberattacks.

Once deployed, the goal of this trojan is to steal login credentials from unsuspecting users which are then used to take over their banking and cryptocurrency accounts to commit fraud according to BleepingComputer.

Distributed through fake apps

Just like with other malware strains, ERMAC 2.0 is distributed using fake apps which are downloaded and installed directly onto an Android smartphone as opposed to through the Google Play Store.

Security researchers at the cybersecurity firm ESET discovered that a fake Bolt Food application is currently being used to distribute ERMAC 2.0 in Poland. The malicious app impersonates the legitimate food delivery service but, fortunately, the fake site used by the cybercriminals behind this latest malware campaign has been taken down.

Before it was taken down, links to the site were likely sent to potential victims through phishing emails, social media posts or by SMS. If a user did manage to download the fake app via the site, a permission request popped up when the app first opened asking them to give it full control of their device.

With access to Android’s Accessibility Services, the fake app is able to serve application overlays that are used to steal login details from users who think they are inputting their credentials in Bolt Food’s legitimate app.

ERMAC 2.0 supports an extensive list of apps

While version 1.0 of ERMAC was capable of targeting 378 different applications including the apps of many popular banks, version 2.0 has bumped up the number of supported apps to 467.

Going forward, we’ll likely see other campaigns impersonating popular apps in order to distribute ERMAC 2.0. According to a blog post from the threat intelligence company Cyble, ERMAC’s creators already have a number of overlays set up to steal user credentials from IDBI Bank, Santander, GreaterBank and Bitbank.

One of the reasons that ERMAC 2.0 is so dangerous is due to the number of permissions it grants itself upon installation. With access to 43 different permissions, the malware is able to access your SMS messages, contacts, microphone and device storage.

How to protect yourself from Android malware and banking trojans

APK App Installation File

(Image credit: Updraft)

The simplest and easiest way to protect yourself and your devices from malware and banking trojans is not to install apps from unknown sources and use the Google Play Store, Amazon Appstore or the Samsung Galaxy Store.

Although installing an app using an APK file can be fast and convenient, these installation files aren’t checked for malware and other threats which could lead to you falling victim to fraud or even worse, identity theft.

At the same time, you should always be wary when granting permissions in Android. Not every app needs to access your camera, microphone or storage to function properly and cybercriminals often exploit Android’s Accessibility Services to give their fake apps more features.

TOPICS
Anthony Spadafora
Managing Editor Security and Home Office

Anthony Spadafora is the managing editor for security and home office furniture at Tom’s Guide where he covers everything from data breaches to password managers and the best way to cover your whole home or business with Wi-Fi. He also reviews standing desks, office chairs and other home office accessories with a penchant for building desk setups. Before joining the team, Anthony wrote for ITProPortal while living in Korea and later for TechRadar Pro after moving back to the US. Based in Houston, Texas, when he’s not writing Anthony can be found tinkering with PCs and game consoles, managing cables and upgrading his smart home. 

Read more
Green skull on smartphone screen.
This Android banking trojan steals passwords to take over your accounts — and all it takes is a single text message
A smartphone screen displaying the Android name and logo next to a sign reading 'MALWARE'.
Fake Google Play Store pages are spreading Trojan malware that can steal your financial data
Green skull on smartphone screen.
Malicious Android apps with 60 million installs bombarding phones with ads and phishing attacks — how to stay safe
Malware
Dangerous new password-stealing trojan automatically reinstalls itself on infected PCs
One phone with skull and crossbones on screen among several other clean-looking phones.
Malicious iPhone apps are spreading screenshot-reading malware on the Apple App Store — how to stay safe
A hacker typing quickly on a keyboard
New MassJacker malware is hijacking digital wallets to steal large sums from users
Latest in Malware & Adware
Green skull on smartphone screen.
Malicious Android apps with 60 million installs bombarding phones with ads and phishing attacks — how to stay safe
Malware
Dangerous new password-stealing trojan automatically reinstalls itself on infected PCs
An FBI agent typing on a computer
FBI issues warning to millions of Americans to avoid these websites that can steal your passwords and banking info
A hacker typing quickly on a keyboard
New MassJacker malware is hijacking digital wallets to steal large sums from users
A person trying to set up a new Wi-Fi router
Thousands of TP-Link routers have been infected by a botnet to spread malware
A smartphone screen displaying the Android name and logo next to a sign reading 'MALWARE'.
Fake Google Play Store pages are spreading Trojan malware that can steal your financial data
Latest in News
Nintendo Switch 2
Nintendo Switch 2 rumored specs — here’s what we know so far
iPhone 17 Pro render
iPhone 17 Pro — 7 biggest rumored upgrades
CAD renderings of the Google Pixel 10 Pro XL
Pixel 10 leak could be good news for all Android phones
A magnifying glass on top of the Steam logo in a web browser
Valve just pulled a malicious game demo spreading info-stealing malware from Steam
Lewis Hamilton of Great Britain and Scuderia Ferrari looks on during Sprint Qualifying ahead of the F1 Grand Prix of China at Shanghai International Circuit in Shanghai, China, on March 21, 2025. (Photo by Song Haiyuan/Paddocker/NurPhoto via Getty Images)
How to watch Chinese Grand Prix 2025 online – stream F1 without cable, qualifying highlights
NYTimes Connections
NYT Connections today hints and answers — Saturday, March 22 (#650)