ERMAC V3.0 Banking Trojan Source Code Leak Exposes Malware Infrastructure
Summary
Hide â˛
Show âŧ
The source code for ERMAC V3.0, an Android banking trojan, has been leaked, revealing the full infrastructure behind the malware. ERMAC V3.0 targets over 700 banking, shopping, and cryptocurrency applications, expanding its data theft capabilities. The leak includes the backend, frontend, exfiltration server, and Android builder panel, providing insights into the malware's operations and vulnerabilities. The leak exposes critical weaknesses, such as hardcoded secrets, default credentials, and open account registration, which can be used to track, detect, and disrupt active operations. ERMAC V3.0 is attributed to the threat actor DukeEugene and is an evolution of Cerberus and BlackRock. The source code was discovered in an open directory by Hunt.io researchers in March 2024. The leak weakens the malware operation by eroding customer trust and improving threat detection solutions, but may lead to modified variants of ERMAC that are more difficult to detect.
Timeline
-
16.08.2025 13:41 đ° 2 articles
ERMAC V3.0 Source Code Leak Exposes Full Malware Infrastructure
The source code for ERMAC V3.0, an Android banking trojan, has been leaked, revealing the full infrastructure behind the malware. The leak includes the backend, frontend, exfiltration server, and Android builder panel, providing insights into the malware's operations and vulnerabilities. The leak exposes critical weaknesses, such as hardcoded secrets, default credentials, and open account registration, which can be used to track, detect, and disrupt active operations. The source code was discovered in an open directory by Hunt.io researchers in March 2024. The leak includes the backend, frontend, exfiltration server, and Android builder panel, providing insights into the malware's operations and vulnerabilities. The leak exposes critical weaknesses, such as hardcoded secrets, default credentials, and open account registration, which can be used to track, detect, and disrupt active operations. The article also discusses the evolution of ERMAC, from its initial documentation in September 2021 to the promotion of a new malware tool named Hook in January 2023. The leak weakens the malware operation by eroding customer trust and improving threat detection solutions, but may lead to modified variants of ERMAC that are more difficult to detect.
Show sources
- ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure â thehackernews.com â 16.08.2025 13:41
- ERMAC Android malware source code leak exposes banking trojan infrastructure â www.bleepingcomputer.com â 18.08.2025 21:12
Information Snippets
-
ERMAC V3.0 targets over 700 banking, shopping, and cryptocurrency applications.
First reported: 16.08.2025 13:41đ° 2 sources, 2 articlesShow sources
- ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure â thehackernews.com â 16.08.2025 13:41
- ERMAC Android malware source code leak exposes banking trojan infrastructure â www.bleepingcomputer.com â 18.08.2025 21:12
-
The malware can send SMS, initiate phone calls, set up call forwarding, display custom notifications, fetch Gmail email subject lines, take pictures, launch overlays, capture contact lists, SMS messages, installed apps, and remove itself from the device.
First reported: 16.08.2025 13:41đ° 2 sources, 2 articlesShow sources
- ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure â thehackernews.com â 16.08.2025 13:41
- ERMAC Android malware source code leak exposes banking trojan infrastructure â www.bleepingcomputer.com â 18.08.2025 21:12
-
ERMAC V3.0 includes a backend C2 server, frontend panel, exfiltration server, Android backdoor, and builder tool.
First reported: 16.08.2025 13:41đ° 2 sources, 2 articlesShow sources
- ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure â thehackernews.com â 16.08.2025 13:41
- ERMAC Android malware source code leak exposes banking trojan infrastructure â www.bleepingcomputer.com â 18.08.2025 21:12
-
The leak reveals critical vulnerabilities, including hardcoded JWT secrets, static admin tokens, default root credentials, and open account registration.
First reported: 16.08.2025 13:41đ° 2 sources, 2 articlesShow sources
- ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure â thehackernews.com â 16.08.2025 13:41
- ERMAC Android malware source code leak exposes banking trojan infrastructure â www.bleepingcomputer.com â 18.08.2025 21:12
-
ERMAC V3.0 does not target devices in CIS nations.
First reported: 16.08.2025 13:41đ° 1 source, 1 articleShow sources
- ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure â thehackernews.com â 16.08.2025 13:41
-
The malware uses AES-CBC encrypted communications.
First reported: 16.08.2025 13:41đ° 2 sources, 2 articlesShow sources
- ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure â thehackernews.com â 16.08.2025 13:41
- ERMAC Android malware source code leak exposes banking trojan infrastructure â www.bleepingcomputer.com â 18.08.2025 21:12
Similar Happenings
APT28 deploys NotDoor backdoor via Microsoft Outlook
APT28, a Russian state-sponsored threat group, has been using a new backdoor malware called NotDoor to target Microsoft Outlook. The malware exploits Outlook as a covert communication, data exfiltration, and malware delivery channel. NotDoor is a VBA macro that monitors incoming emails for specific trigger words. When triggered, it allows attackers to exfiltrate data, upload files, and execute commands on the victim's computer. The malware is delivered via a legitimate signed binary, Microsoft's OneDrive.exe, vulnerable to DLL sideloading. The backdoor was identified by researchers from Lab52, the threat intelligence arm of Spanish cybersecurity firm S2 Grupo. The malware has been deployed against companies in NATO member countries, using advanced techniques to evade detection and maintain persistence. NotDoor supports multiple commands for data exfiltration and file uploads, and uses Base64-encoded PowerShell commands for various operations. The malware creates a staging folder in the %TEMP% directory to store and exfiltrate files, encoding them with custom encryption before sending via email. APT28's attacks involve the abuse of Microsoft Dev Tunnels for C2 infrastructure, providing stealth and rapid infrastructure rotation. The attack chain includes the use of bogus Cloudflare Workers domains to distribute additional payloads, demonstrating a high level of specialized design and obfuscation.
Malicious nx Packages Exfiltrate 2,349 GitHub, Cloud, and AI Credentials in Supply Chain Attack
A supply chain attack on the nx build system compromised multiple npm packages, leading to the exfiltration of 2,349 GitHub, cloud, and AI credentials. The attack unfolded in three distinct phases, impacting 2,180 accounts and 7,200 repositories. The attack exploited a vulnerable workflow in the nx repository to publish malicious versions of the nx package and supporting plugins. The compromised packages scanned file systems for credentials and sent them to attacker-controlled GitHub repositories. The attack impacted over 1,346 repositories and affected Linux and macOS systems. The nx maintainers identified the root cause as a vulnerable workflow added on August 21, 2025, that allowed for the injection of executable code via a pull request title. The malicious packages were published on August 26, 2025, and have since been removed from the npm registry. The attackers leveraged the GITHUB_TOKEN to trigger the publish workflow and exfiltrate the npm token. The malicious postinstall script scanned systems for text files, collected credentials, and sent them to publicly accessible GitHub repositories. The script also modified .zshrc and .bashrc files to shut down the machine immediately upon user interaction. The nx maintainers have rotated npm and GitHub tokens, audited activities, and updated publish access to require two-factor authentication. Wiz researchers identified a second attack wave impacting over 190 users/organizations and over 3,000 repositories. The second wave involved making private repositories public and creating forks to preserve data. GitGuardian's analysis revealed that 33% of compromised systems had at least one LLM client installed, and 85% were running Apple macOS. The attack took approximately four hours from start to finish. AI-powered CLI tools were used to dynamically scan for high-value secrets. The malware created public repositories on GitHub to store stolen data. The attack impacted over 1,000 developers, exfiltrating around 20,000 sensitive files. The malware modified shell startup files to crash systems upon terminal access. The attack was detected by multiple cybersecurity vendors. The malicious packages were removed from npm at 2:44 a.m. UTC on August 27, 2025. GitHub disabled all singularity-repository instances by 9 a.m. UTC on August 27, 2025. Around 90% of leaked GitHub tokens remain active as of August 28, 2025.
AI-Driven Ransomware Strain PromptLock Discovered
A new ransomware strain named PromptLock has been identified by ESET researchers. This strain leverages AI to generate malicious scripts in real-time, making it more difficult to detect and defend against. PromptLock is currently in development and has not been observed in active attacks. It can exfiltrate files, encrypt data, and is being upgraded to destroy files. The ransomware uses the gpt-oss:20b model from OpenAI via the Ollama API and is written in Go, targeting Windows, Linux, and macOS systems. The Bitcoin address associated with PromptLock appears to belong to Satoshi Nakamoto. PromptLock uses Lua scripts generated from hard-coded prompts to enumerate the local filesystem, inspect target files, exfiltrate selected data, and perform encryption. The ransomware can generate custom ransom notes based on the type of infected machine and uses the SPECK 128-bit encryption algorithm to lock files. PromptLock is assessed to be a proof-of-concept (PoC) rather than a fully operational malware deployed in the wild.
HOOK Android Trojan Expands Capabilities with Ransomware Overlays and 107 Remote Commands
A new variant of the HOOK Android banking trojan has been discovered, featuring ransomware-style overlay screens to extort victims. This variant supports 107 remote commands, including new capabilities for capturing user gestures, stealing cryptocurrency wallet information, and displaying fake NFC overlays. The trojan is distributed via phishing websites, bogus GitHub repositories, and malicious APK files, posing a significant threat to financial institutions and users. The HOOK trojan is believed to be an offshoot of the ERMAC banking trojan, which had its source code leaked publicly. The trojan can display fake overlays on financial apps to steal credentials and abuse Android accessibility services for fraud and remote control. The latest version of HOOK includes commands for ransomware overlays, capturing user gestures, and stealing sensitive information like credit card details and lockscreen PINs. It also features transparent overlays to capture user gestures and screen-streaming sessions for real-time monitoring.
ReVault vulnerability in Dell Control Vault firmware disclosed
A critical security flaw, dubbed ReVault, has been discovered in the Control Vault firmware used in millions of Dell Latitude and Precision laptops. This vulnerability allows unauthorized access to secure peripherals, such as fingerprint and smart card readers, potentially enabling attackers to extract secret keys and bypass authentication mechanisms. The flaw affects the control board managing secure peripherals, allowing any user on the machine to send undocumented commands. This can lead to code execution, extraction of secret keys, and permanent modification of the firmware, persisting even after reinstalling the operating system. The ReVault vulnerability consists of five CVEs, three of which were combined to achieve code execution and firmware modification. Dell and Broadcom have released patches to address the vulnerability, emphasizing the importance of firmware security and thorough analysis of embedded systems.