ERMAC 3.0 Android Banking Trojan Exposed: Researchers Reveal Codebase and Critical Flaws

ERMAC 3.0 Android Banking Trojan Exposed: Researchers Reveal Codebase and Critical Flaws

Cybersecurity researchers have uncovered key details about ERMAC 3.0, the latest iteration of an Android banking trojan, revealing extensive data theft capabilities and significant weaknesses in its backend infrastructure. The malware, which targets over 700 banking, shopping, and cryptocurrency apps, represents a notable evolution in mobile cybercrime.

In a report by Hunt.io, researchers disclosed they had accessed the complete source code of the malware-as-a-service (MaaS) variant from an open directory hosted on 141.164.62[.]236:443. The leak exposed the entire ERMAC 3.0 ecosystem, including its PHP-Laravel backend, React frontend, Golang-based exfiltration server, and the Android builder panel used to configure malware campaigns.

ERMAC, first identified in 2021 by ThreatFabric, is attributed to the threat actor “DukeEugene” and is considered an evolution of earlier Android malware families like Cerberus and BlackRock. ERMAC’s lineage also connects it to other modern malware strains, including Hook (ERMAC 2.0), Pegasus, and Loot.

Key components of the ERMAC 3.0 architecture include:

Backend C2 Server: Used to manage victim devices and extract compromised data such as SMS logs and app credentials.

Frontend Panel: Enables attackers to issue commands, control overlays, and interact with infected devices.

Exfiltration Server: A Golang-based system for siphoning stolen data.

Android Backdoor: Written in Kotlin, this implant collects sensitive data and executes commands, while avoiding devices in CIS (Commonwealth of Independent States) countries.

ERMAC Builder: Customizes malware builds by allowing operators to input app names, server addresses, and configurations.

ERMAC 3.0 introduces enhanced form injection techniques, AES-CBC encrypted communications, and a revamped command-and-control panel to boost its stealth and functionality.

However, the leaked infrastructure also exposes serious security flaws in ERMAC’s design. These include a hardcoded JWT secret, static admin bearer token, default root credentials, and open admin panel registrations—vulnerabilities that defenders can exploit to track or disable ongoing operations.

The revelation underscores both the sophistication and fragility of modern mobile malware ecosystems and provides cybersecurity professionals with valuable intelligence for proactive defense.

- Advertisement -

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

error: Content is protected !!

Share your details to download the Cybersecurity Report 2025

Share your details to download the CISO Handbook 2025

Sign Up for CXO Digital Pulse Newsletters

Share your details to download the Research Report

Share your details to download the Coffee Table Book

Share your details to download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch