Hydra, a banking trojan that targets Android devices, was first discovered in 2019. By tricking users into enabling dangerous permissions on the mobile device, Hydra steals finance credentials. In October 2022, Hydra was the second most common mobile malware, behind Anubis and ahead of Joker.
Hydra is commonly distributed via phishing messages and websites, as well as malicious applications in google store. If a mobile user clicks on a link, the malware is downloaded and installed on the device. Hydra then takes steps to hide itself from detection, including removing its launch icon from the home screen, protecting against uninstall, and similar tactics.
Hydra is known for asking users to enable dangerous permissions, including a list of over 20 requests by default. If a user grants these permissions to the mobile app, then it has wide-reaching access to various device features. Some of the malicious actions that Hydra can take with these permissions include:
Hydra is a dangerous and versatile example of mobile malware. Once installed on a device, it can collect a range of sensitive data and perform various other malicious actions. Organizations can take a variety of actions to protect themselves, their employees, and their devices against Hydra malware. Some best practices for mobile device protection include the following:
While Hydra is indeed one of the leading malware threats to mobile devices, organizations face various malware and other cyber threats. Learn more about the current state of the cyber threat landscape in Check Point’s 2023 Cyber Security Report.
Check Point Harmony Mobile provides robust threat prevention for mobile devices, including against Hydra and other mobile malware variants. It uses Check Point ThreatCloud AI’s threat intelligence to identify and defend against the latest threat campaigns. Learn more about how Harmony Endpoint can help your organization protect against Hydra malware and other mobile threats by signing up for a free demo today.