Fake shops distribute malicious apps and target bank data

Fake shops distribute malicious apps and target bank data

Share post

Experts from the European IT security manufacturer ESET have discovered and analyzed a cybercrime campaign that is still ongoing. Unsuspecting online shoppers are to be tricked into downloading malicious apps. Once these applications get onto the smartphone, the hackers steal banking information using fake websites masquerading as legitimate services.

“In order to make the already convenient online shopping even more convenient, people are increasingly using their smartphones for shopping. These purchases now make up the majority of online shopping orders - most of them through vendor-specific applications," says ESET researcher Lukáš Štefanko, who analyzed the malicious apps. “The campaign is only targeting Malaysia at the moment but could later expand to other countries and banks. The attackers are currently only targeting bank data. In the future, however, there could also be theft of credit card information.”

Cybercrime campaign continues

This campaign was first reported in late 2021, with the attackers posing as a reputable cleaning service. The campaign was distributed via Facebook ads and tricked potential victims into downloading Android malware from a malicious website. In January 2022, the Malware Hunter team identified three more malicious websites and Android Trojans attributed to this campaign. Recently, ESET researchers found four more fake websites. All seven sites posed as services only available in Malaysia. ESET researchers found the same malware in all three malicious apps examined.

All fake - all a trap

The fake websites do not provide an opportunity to purchase directly from them. Instead, they contain buttons that pretend to download apps from Google Play. However, clicking these buttons does not lead to the Google Play Store but to servers with malicious apps controlled by the criminals. For this attack to be successful, victims must turn on the "Unknown origins" or "Unknown sources" option on their devices, which is not enabled by default. Upon completing the purchase, victims are offered payment options - they can either pay by credit card or by transferring the required amount from their bank account. At the time this research was conducted, it was not possible to select the credit card payment option.

Two-factor authentication is partially bypassed

After selecting the direct bank transfer option, victims are presented with a fake payment page asking them to select their bank from the eight Malaysian banks offered and then to enter their credentials. After entering their banking information, victims receive an error message informing them that the user ID or password provided is invalid. At this point, the credentials entered have already been sent to the malware operators. To ensure that the criminals can break into their victims' bank accounts, the fake shop applications also forward all SMS messages that the victim receives to the operators in case they use bank-sent codes for two-factor authentication. Authentication (2FA) included.

More at ESET.com

 


About ESET

ESET is a European company with headquarters in Bratislava (Slovakia). ESET has been developing award-winning security software since 1987 that has already helped over 100 million users enjoy secure technology. The broad portfolio of security products covers all common platforms and offers companies and consumers worldwide the perfect balance between performance and proactive protection. The company has a global sales network in over 180 countries and branches in Jena, San Diego, Singapore and Buenos Aires. For more information, visit www.eset.de or follow us on LinkedIn, Facebook and Twitter.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more