"value":"Another set of banking Trojans has found its way past Google Play\u00e2\u20ac\u2122s security mechanisms, this time targeting a number of Polish banks. The malware managed to sneak into Google Play disguised as seemingly legitimate apps \u00e2\u20ac\u0153Crypto Monitor\u00e2\u20ac\u009d, a cryptocurrency price tracking app, and \u00e2\u20ac\u0153StorySaver\u00e2\u20ac\u009d, a third-party tool for downloading stories from Instagram.",
"Tag":[
{
"colour":"#00223b",
"local":"0",
"name":"osint:source-type=\"blog-post\"",
"relationship_type":""
}
]
},
{
"category":"Payload delivery",
"comment":"",
"deleted":false,
"disable_correlation":false,
"timestamp":"1513761473",
"to_ids":true,
"type":"filename",
"uuid":"5a3a26cc-30dc-4013-8210-4b21950d210f",
"value":"com.comarch.mobile"
},
{
"category":"Payload delivery",
"comment":"",
"deleted":false,
"disable_correlation":false,
"timestamp":"1513761473",
"to_ids":true,
"type":"filename",
"uuid":"5a3a26cd-2184-4b96-9018-4666950d210f",
"value":"pl.bzwbk.bzwbk24"
},
{
"category":"Payload delivery",
"comment":"",
"deleted":false,
"disable_correlation":false,
"timestamp":"1513761473",
"to_ids":true,
"type":"filename",
"uuid":"5a3a26cd-adc0-4e15-ac10-4428950d210f",
"value":"com.getingroup.mobilebanking"
},
{
"category":"Payload delivery",
"comment":"",
"deleted":false,
"disable_correlation":false,
"timestamp":"1513761473",
"to_ids":true,
"type":"filename",
"uuid":"5a3a26cd-7284-44be-9b2a-4461950d210f",
"value":"pl.pkobp.iko"
},
{
"category":"Payload delivery",
"comment":"",
"deleted":false,
"disable_correlation":false,
"timestamp":"1513761473",
"to_ids":true,
"type":"filename",
"uuid":"5a3a26cd-0fbc-446c-8323-464f950d210f",
"value":"pl.ing.mojeing"
},
{
"category":"Payload delivery",
"comment":"",
"deleted":false,
"disable_correlation":false,
"timestamp":"1513761473",
"to_ids":true,
"type":"filename",
"uuid":"5a3a26cd-ebe0-42da-880e-423a950d210f",
"value":"wit.android.bcpBankingApp.millenniumPL"
},
{
"category":"Payload delivery",
"comment":"",
"deleted":false,
"disable_correlation":false,
"timestamp":"1513761473",
"to_ids":true,
"type":"filename",
"uuid":"5a3a26cd-40dc-45f5-9e92-4e8e950d210f",
"value":"pl.mbank"
},
{
"category":"Payload delivery",
"comment":"",
"deleted":false,
"disable_correlation":false,
"timestamp":"1513761473",
"to_ids":true,
"type":"filename",
"uuid":"5a3a26cd-83a8-470d-b24a-4a56950d210f",
"value":"pl.bph"
},
{
"category":"Payload delivery",
"comment":"",
"deleted":false,
"disable_correlation":false,
"timestamp":"1513761473",
"to_ids":true,
"type":"filename",
"uuid":"5a3a26cd-7ad0-48d3-8d55-4435950d210f",
"value":"pl.fmbank.smart"
},
{
"category":"Payload delivery",
"comment":"",
"deleted":false,
"disable_correlation":false,
"timestamp":"1513761473",
"to_ids":true,
"type":"filename",
"uuid":"5a3a26cd-4c38-47ad-9bfa-4715950d210f",
"value":"eu.eleader.mobilebanking.pekao"
},
{
"category":"Payload delivery",
"comment":"",
"deleted":false,
"disable_correlation":false,
"timestamp":"1513761473",
"to_ids":true,
"type":"filename",
"uuid":"5a3a26cd-a3dc-432a-b5cb-4171950d210f",
"value":"eu.eleader.mobilebanking.pekao.firm"
},
{
"category":"Payload delivery",
"comment":"",
"deleted":false,
"disable_correlation":false,
"timestamp":"1513761473",
"to_ids":true,
"type":"filename",
"uuid":"5a3a26cd-cc3c-480c-8cb4-4612950d210f",
"value":"eu.eleader.mobilebanking.invest"
},
{
"category":"Payload delivery",
"comment":"",
"deleted":false,
"disable_correlation":false,
"timestamp":"1513761473",
"to_ids":true,
"type":"filename",
"uuid":"5a3a26cd-634c-4d09-826d-4a28950d210f",
"value":"eu.eleader.mobilebanking.raiffeisen"
},
{
"category":"Payload delivery",
"comment":"",
"deleted":false,
"disable_correlation":false,
"timestamp":"1513761473",
"to_ids":true,
"type":"filename",
"uuid":"5a3a26cd-6cd0-44dd-9c14-4ffa950d210f",
"value":"com.konylabs.cbplpat"
},
{
"category":"Network activity",
"comment":"Phishing server",
"deleted":false,
"disable_correlation":false,
"timestamp":"1513761473",
"to_ids":true,
"type":"domain",
"uuid":"5a3a2774-9c5c-48e5-b05e-49bb950d210f",
"value":"nelis.at"
},
{
"category":"Network activity",
"comment":"Phishing server",
"deleted":false,
"disable_correlation":false,
"timestamp":"1513761473",
"to_ids":true,
"type":"domain",
"uuid":"5a3a2774-8a18-4838-a42e-47e6950d210f",
"value":"sdljfkh1313.win"
}
],
"Object":[
{
"comment":"",
"deleted":false,
"description":"File object describing a file with meta-information",