• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Android Security Computer security data security Device security Latest Cybersecurity News Mobile security

Cerberus malware is deployed and distributed after compromising a company’s MDM server

William Marshal Posted On May 2, 2020
15



Cerberus trojan attack

Cyber criminals have breached into 75% of multinational conglomerate’s android devices using the Cerberus banking Trojan by breaching into Mobile Device Manager (MDM) server of the company. 

MDM is otherwise known as Enterprise Mobility Management Solution which assists organizations in managing the remote and mobile devices, say it be iOS, Android, macOS, or Windows. This solution usually comes with a server like any other product and it will be used to enroll in the corporate devices, to manage and secure them, allowing technicians to deploy applications, profiles, secure emails, conditional exchange access, content management and more.

What is Cerberus?

Cerberus is a Banking Trojan that was discovered in June 2019 is a MaaS and being used by the clients after purchasing them to drop payloads, take over and manipulate the devices. If the Cerberus malware is successfully deployed into a device, it can steal a wide range of business sensitive information like SMS, call logs, device credentials, two-factor authentication codes, device lock patterns, fetch information about installed apps and log keystokes. 

As soon as the hackers had breached into the company’s MDM servers, they deployed the Cerberus to a substantial amount of android devices as per Check Point Security researchers report. Furthermore, the attackers had installed two suspicious apps in number of devices using the MDM server, and after identifying the presence of this malicious application, the company has decided to factory reset all the android devices that had been enrolled with the compromised MDM server.

After successfully establishing itself within the device, the malware requests access for android accessibility service, asking the users to activate the same. Once approved, the malware is now more like a Thanos with all the infinity stones, it can navigate menus, make clicks, and totally bypass user dependency.

Cerberus’s overwhelming control over the devices

Cerberus is capable of Remote Access Trojan behavior, allowing cyber criminals to remotely control the infected device, and is also capable of overlay, allowing it to capture passwords, patterns, PINs, and even the two-factor authentication security. Furthermore, this malware can make calls behalf of the user, send SMS and USSD requests, install/uninstall applications and more.

Cerberus will continue to block the users privilege to uninstall Team Viewer and meanwhile gains administrative privileges as well. Additionally, it also prevents its installation procedures by not displaying the app details page. Cerberus ensures its deployment is safe by using Google Play Protect and sustaining its presence in the device.With the deployment of Cerberus, technicians will no longer be able to perform mobile device management operations on their managed devices. If you’re interested in understanding the malware further by studying the android apps’ package names, please check Check Point’s report on the same.

Share the article with your friends


Cerberus banking trojanCerberus compromised MDM serverCerberus malware attack on MDMCerberus trojanMDM server compromised by Cerberus trojan


Author

William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

15 Comments

تحميل برنامج فوتوشوب للكمبيوتر 2019
May 6, 2020 at 5:02 pm
Reply

Hi there, just wanted to mention, I loved this article. It
was practical. Keep on posting!


ปั้มไลค์
July 8, 2020 at 8:10 am
Reply

Like!! I blog frequently and I really thank you for your content. The article has truly peaked my interest.


joker izle
January 19, 2021 at 11:16 am
Reply

I consider something genuinely interesting about your web site so I saved to fav. Winnie Arvie Johansen


erotik
January 21, 2021 at 2:53 pm
Reply

I am regular reader, how are you everybody? This post posted at this web page is genuinely pleasant. Marji Gordon Laurita


online
January 29, 2021 at 9:34 pm
Reply

Major thankies for the blog article. Thanks Again. Great. Druci Levey Knitter


dublaj
January 30, 2021 at 10:36 am
Reply

Pretty section of content. I just stumbled upon your site and in accession capital to assert that I get in fact enjoyed account your blog posts. Any way I will be subscribing to your feeds and even I achievement you access consistently rapidly. Dorthea Sky Knoll


altyazili
January 30, 2021 at 11:05 pm
Reply

Hi, I desire to subscribe for this weblog to get latest updates, therefore where can i do it please assist. Roxanne Bevan Gorlin


movies
January 31, 2021 at 11:51 am
Reply

You should take part in a contest for one of the finest sites online. I am going to recommend this site! Angelique Paul Niko


online
January 31, 2021 at 11:26 pm
Reply

Having read this I thought it was rather enlightening. Erda Carlos Nevai


movie online
February 1, 2021 at 12:24 pm
Reply

Usually posts some incredibly intriguing stuff like this. If you are new to this site. Lorrayne Hashim Bullen Koo Bord Yalonda


720p
February 1, 2021 at 2:20 pm
Reply

Is there any test data for 5G AKA? I want to verify my code is correct or not. Effie Raymund Meagher


filmkovasi
February 1, 2021 at 10:04 pm
Reply

whoah this blog is great i love studying your articles. Georgianna Hugues Fortunia


torrent
February 6, 2021 at 5:43 pm
Reply

Very informative article. Really looking forward to read more. Cool. Margarethe Lowe Bittencourt


online
February 6, 2021 at 7:35 pm
Reply

I like it when people come together and share ideas. Great site, keep it up! Teriann Nate Weikert


hindi movie
February 6, 2021 at 11:55 pm
Reply

Definitely, what a fantastic blog and revealing posts, I definitely will bookmark your blog. Have an awsome day! Guenna Pooh Weissmann


Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search