Cyber Security News

Android App on Google Play Targets Indian Users to Steal Login Credentials

A malicious Android application, Finance Simplified (package: com.someca.count), has been identified on the Google Play Store, targeting Indian users under the guise of a financial management tool.

The app, which claims to offer an EMI calculator, is instead a sophisticated malware platform facilitating predatory lending, data theft, and extortion.

Rapid Spread and Exploitative Practices

The app has seen a sharp rise in downloads, surging from 50,000 to 100,000 installations in just one week.

Once installed, it leverages location-based targeting to display unauthorized loan applications through WebView.

These apps redirect users to external websites that bypass Google Play’s security mechanisms by hosting APK files on external servers.

Victims are coerced into exploitative loan agreements and subjected to harassment through blackmail tactics, including the creation of deepfake images using their personal photos.

Technical Mechanisms and Data Breaches

The app requests excessive permissions, including access to location data, contacts, call logs, SMS messages, clipboard content, and external storage.

It silently collects sensitive information such as passwords, credit card details, and private messages.

This data is transmitted to a command-and-control (C2) server hosted on Amazon EC2 infrastructure.

The admin panel of this server supports both English and Chinese languages, suggesting potential involvement of Chinese-speaking attackers.

Key features of the app’s malicious activities include:

  • Dynamic WebView Manipulation: Injecting JavaScript code to display fake loan applications tailored to the user’s location.
  • Persistent Data Harvesting: Capturing clipboard entries, tracking call logs, extracting contact details (including emails and phone numbers), and monitoring SMS communications.
  • Blackmail Tactics: Editing user photos into fake nude images for extortion purposes.

Cyfirma investigation revealed that Finance Simplified is part of a larger network of fraudulent apps such as KreditApple, MoneyAPE, StashFur, and PokketMe.

These apps share similar interfaces and privacy policies while claiming registration with Indian financial regulators, a claim proven false by their removal from the Play Store for fraudulent activities.

These apps utilize misleading tactics like dynamic privacy policies hosted on external URLs that can be altered post-installation without user knowledge.

This enables attackers to inject harmful updates or redirect users to phishing sites.

The emergence of apps like Finance Simplified underscores the growing sophistication of cybercriminals exploiting mobile platforms.

Users are advised to scrutinize app permissions carefully and avoid downloading applications from unverified sources even from official platforms like Google Play Store.

Organizations should implement robust endpoint security measures and collaborate with app marketplaces to identify and remove malicious apps promptly.

This case serves as a stark reminder of the critical need for heightened cybersecurity awareness in combating financial cybercrime in India and beyond.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Landmark Admin Suffers Major Breach, Exposing Data of 1.6M+ Users

Landmark Admin, LLC (“Landmark”), a Texas-based third-party administrator for life insurance carriers, has confirmed that…

2 hours ago

SquareX to Reveal Critical Data Splicing Attack at BSides SF, Exposing Major DLP Vulnerability

SquareX researchers Jeswin Mathai and Audrey Adeline will be disclosing a new class of data exfiltration techniques at BSides San…

2 hours ago

Firefox Fixes High-Severity Vulnerability Causing Memory Corruption via Race Condition

Mozilla has released Firefox 137.0.2, addressing a high-severity security flaw that could potentially allow attackers…

3 hours ago

Tails 6.14.2 Released with Critical Fixes for Linux Kernel Vulnerabilities

The Tails Project has urgently released Tails 6.14.2, addressing critical security vulnerabilities in the Linux kernel…

4 hours ago

APT29 Hackers Use GRAPELOADER in New Attack Against European Diplomats

Check Point Research (CPR) has uncovered a new targeted phishing campaign employing GRAPELOADER, a sophisticated…

5 hours ago

Chinese Hackers Unleash New BRICKSTORM Malware to Target Windows and Linux Systems

A sophisticated cyber espionage campaign leveraging the newly identified BRICKSTORM malware variants has targeted European…

5 hours ago