Monday, February 24, 2025
HomeAndroidAndroid App on Google Play Targets Indian Users to Steal Login Credentials

Android App on Google Play Targets Indian Users to Steal Login Credentials

Published on

SIEM as a Service

Follow Us on Google News

A malicious Android application, Finance Simplified (package: com.someca.count), has been identified on the Google Play Store, targeting Indian users under the guise of a financial management tool.

The app, which claims to offer an EMI calculator, is instead a sophisticated malware platform facilitating predatory lending, data theft, and extortion.

Rapid Spread and Exploitative Practices

The app has seen a sharp rise in downloads, surging from 50,000 to 100,000 installations in just one week.

Once installed, it leverages location-based targeting to display unauthorized loan applications through WebView.

These apps redirect users to external websites that bypass Google Play’s security mechanisms by hosting APK files on external servers.

Victims are coerced into exploitative loan agreements and subjected to harassment through blackmail tactics, including the creation of deepfake images using their personal photos.

Technical Mechanisms and Data Breaches

The app requests excessive permissions, including access to location data, contacts, call logs, SMS messages, clipboard content, and external storage.

It silently collects sensitive information such as passwords, credit card details, and private messages.

This data is transmitted to a command-and-control (C2) server hosted on Amazon EC2 infrastructure.

The admin panel of this server supports both English and Chinese languages, suggesting potential involvement of Chinese-speaking attackers.

Key features of the app’s malicious activities include:

  • Dynamic WebView Manipulation: Injecting JavaScript code to display fake loan applications tailored to the user’s location.
  • Persistent Data Harvesting: Capturing clipboard entries, tracking call logs, extracting contact details (including emails and phone numbers), and monitoring SMS communications.
  • Blackmail Tactics: Editing user photos into fake nude images for extortion purposes.

Cyfirma investigation revealed that Finance Simplified is part of a larger network of fraudulent apps such as KreditApple, MoneyAPE, StashFur, and PokketMe.

These apps share similar interfaces and privacy policies while claiming registration with Indian financial regulators, a claim proven false by their removal from the Play Store for fraudulent activities.

These apps utilize misleading tactics like dynamic privacy policies hosted on external URLs that can be altered post-installation without user knowledge.

This enables attackers to inject harmful updates or redirect users to phishing sites.

The emergence of apps like Finance Simplified underscores the growing sophistication of cybercriminals exploiting mobile platforms.

Users are advised to scrutinize app permissions carefully and avoid downloading applications from unverified sources even from official platforms like Google Play Store.

Organizations should implement robust endpoint security measures and collaborate with app marketplaces to identify and remove malicious apps promptly.

This case serves as a stark reminder of the critical need for heightened cybersecurity awareness in combating financial cybercrime in India and beyond.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

GitVenom Campaign Abuses Thousands of GitHub Repositories to Infect Users

The GitVenom campaign, a sophisticated cyber threat, has been exploiting GitHub repositories to spread...

UAC-0212: Hackers Unleash Devastating Cyber Assault on Critical Infrastructure

In a recent escalation of cyber threats, hackers have launched a targeted campaign, identified...

Widespread Chrome Malware: 16 Extensions Infect Over 3.2 Million Users

A recent cybersecurity investigation has uncovered a cluster of 16 malicious Chrome extensions that...

Sliver C2 Server Vulnerability Enables TCP Hijacking for Traffic Interception

A significant vulnerability has been discovered in the Sliver C2 server, a popular open-source...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

GitVenom Campaign Abuses Thousands of GitHub Repositories to Infect Users

The GitVenom campaign, a sophisticated cyber threat, has been exploiting GitHub repositories to spread...

UAC-0212: Hackers Unleash Devastating Cyber Assault on Critical Infrastructure

In a recent escalation of cyber threats, hackers have launched a targeted campaign, identified...

Widespread Chrome Malware: 16 Extensions Infect Over 3.2 Million Users

A recent cybersecurity investigation has uncovered a cluster of 16 malicious Chrome extensions that...