Sometimes, even the most sophisticated cybercriminals make simple mistakes. In a dramatic turn of events, the entire operation of a major Android banking trojan has been exposed to the world. Furthermore, it was all thanks to a crucial security error by its operators. We are talking about ERMAC, a malware that mainly targets Android devices.

Hunt.io cybersecurity researchers found the source code for a dangerous piece of Android malware: ERMAC 3.0. They found the complete code base in an open, unprotected online directory. This is a shocking oversight on the part of the criminals.

Security flaws expose ERMAC Android baking malware

The discovery was not just a small piece of the puzzle. Researchers located an archive that contained the malware’s complete package. This includes the backend, a front-end control panel, the exfiltration server, and even the tool criminals used to build their custom attacks.

Think of it as the blueprints for a criminal enterprise being left on a public sidewalk. This leak reveals that ERMAC 3.0 is a notable evolution of previous threats. The malware takes advantage of the foundations of older trojans like Cerberus and Hook. It now has the ability to target more than 700 banking, shopping, and cryptocurrency apps , a massive jump from earlier versions. This trojan can steal sensitive information through sophisticated methods like fake login screens, which appear as overlays on legitimate apps. Its capabilities are extensive: it can capture your contacts, read your Gmail messages, send SMS messages, forward calls, and even use your phone’s front camera to take photos.

ERMAC Android malware panel - 1

ERMAC panel

But the leak exposed more than just the malware’s capabilities. It also revealed some embarrassing security failures by the people running the operation. The server’s admin panel had no password protection. Plus, crucial information—like hardcoded credentials and static tokens—was present in the code. This means defenders now have a clear roadmap of how to detect and disrupt the criminals’ operations. The leak has likely eroded trust among the cybercriminals who used to pay thousands of dollars a month for ERMAC.

A double-edged sword

While the leak is a major win for cybersecurity, it comes with a significant risk. If the source code falls into the wrong hands, other criminal groups could use it to create new, modified versions of ERMAC that are even more difficult to detect. So, this finding makes the leak a double-edged sword. On the bright side, it is a huge setback for one criminal operation. However, it can also lead to a potential new threat from other bad actors. In the world of cybersecurity, a simple mistake can lead to massive consequences for everyone involved.