FluBot: SMS-Based Android Banking Trojan That Masqueraded as Delivery Apps

FluBot is a mobile banking trojan targeting Android devices, designed to steal credentials, intercept SMS messages, and spread via SMS phishing (smishing). First discovered in late 2020, it rapidly became one of the most widespread Android malware campaigns in Europe and beyond. Disguised as apps from DHL, FedEx, and other delivery services, FluBot tricked users into sideloading malicious APKs that granted it broad access to the device.

Introduction to FluBot

FluBot abused Android’s accessibility and notification permissions to steal passwords, credit card numbers, and two-factor codes. It also harvested the victim’s contact list and sent mass SMS messages with fake shipping updates or voicemail alerts to continue its spread. Its infrastructure and capabilities evolved quickly, with frequent updates and shifting geographic targets.


1. How FluBot Works

Infection Mechanism:
FluBot spread through:

Payload Execution:
Once installed, FluBot:


2. History and Notable Campaigns

Origin and Discovery:
FluBot was first detected in late 2020, with rapid spread across Spain, Germany, the UK, and Australia in 2021. It was attributed to a cybercriminal group, not a state actor.

Notable Campaigns:


3. Targets and Impact

Targeted Victims and Sectors:

Consequences:


4. Technical Details

Payload Capabilities:

Evasion Techniques:


5. Preventing FluBot Infections

Best Practices:

Recommended Security Tools:


6. Detecting and Removing FluBot

Indicators of Compromise (IoCs):

Removal Steps:

  1. Boot the phone into safe mode
  2. Manually uninstall the malicious app via settings
  3. Re-enable Google Play Protect if disabled
  4. Reset passwords for any compromised accounts
  5. Run a full mobile antivirus scan

Professional Help:
If the infection results in financial loss or broader access compromise, seek help from mobile forensics or your bank's fraud team.


7. Response to a FluBot Infection

Immediate Steps:


8. Legal and Ethical Implications

Legal Considerations:
Sending SMS malware can constitute wire fraud, identity theft, and computer misuse. Victims may be unintentionally spreading malware — raising legal questions depending on intent and jurisdiction.

Ethical Considerations:
FluBot weaponized trust in mobile communications, creating chain-reaction infections by abusing users' contact lists. Its use shows how personal devices can become tools for mass exploitation.


9. Resources and References


10. FAQs about FluBot

Q: What is FluBot malware?
A mobile banking trojan that spread via SMS, disguised as package tracking or voicemail apps.

Q: How did it infect devices?
By tricking users into installing a fake app from a link in a malicious SMS message.

Q: What did it steal?
Bank credentials, SMS messages, contacts, and crypto wallet data.

Q: Is FluBot still active?
No — it was disrupted in May 2022 by law enforcement, though similar malware may still circulate.


11. Conclusion

FluBot was one of the most widespread Android banking trojans, using SMS-based social engineering and aggressive propagation to infect users and steal sensitive data. Though its infrastructure has been dismantled, FluBot remains a case study in how simple mobile malware can escalate into a global threat — and why users should be cautious with unsolicited messages and sideloaded apps.

 

 

« Back to the Virus Information Library

« Back to the Security Center