Saturday, October 12, 2024
HomeAndroidOver 1800 Android Mobile App Web Injects for Sale on Hacking Forums

Over 1800 Android Mobile App Web Injects for Sale on Hacking Forums

Published on

Malware protection

Cyble Research and Intelligence Labs (CRIL) is a security research organization that has been monitoring the actions of a group of cyber criminals called “InTheBox”. 

This group is primarily active on a Russian-language cybercrime forum, where they engage in illegal activities such as hacking, fraud, and other forms of cybercrime.

InTheBox operates an online shop that is accessible through the anonymizing network Tor. This shop sells tools and services for carrying out cybercrime, such as “web injects.” 

- Advertisement - SIEM as a Service

This web injects are pieces of malicious code that can be used to manipulate and steal sensitive information from victims who use infected Android devices for banking activities. 

The shop has been expanding its inventory by adding new web injects that are compatible with various Android banking malware. This web injects are being sold at low prices and with attractive discounts, making them appealing to other cybercriminals.

The Threat Actor provided web injects that aimed to compromise various types of financial services, including retail banking, mobile payment platforms, cryptocurrency exchanges, and e-commerce apps run by well-known companies in numerous countries like:-

  • Australia
  • Brazil
  • India
  • Indonesia
  • Japan
  • Kuwait
  • Malaysia
  • Philippines
  • Qatar
  • Saudi Arabia
  • Singapore
  • Thailand
  • The United States

Android Mobile App Web Inject Packages

InTheBox is a well-established player in the cybercrime market, with a verified history of selling web injects for Android mobile applications since February 2020. 

They run an online shop that is accessible through the Tor network, providing an anonymous and secure platform for the sale of their malicious products. The shop is automated, allowing for quick and efficient transactions for customers looking to buy web injects.

The prices for the unlimited web inject packages were listed as follows on the online shop:-

  • 814 web injects compatible with Alien, Ermac, Octopus, and MetaDroid for USD 6,512
  • 495 web injects compatible with Cerberus for USD 3,960
  • 585 web injects compatible with Hydra for USD 4,680

InTheBox has lowered the cost for single web injects from USD 50 to USD 30 each. Additionally, for any banking malware bot, they also offer a customized web inject development service.

Web Injects Shared as Archive

InTheBox provides web injects which are typically packaged in a compressed archive. The archive contains two elements:- 

  • An app icon in PNG format
  • An HTML file

The HTML file included in the web injects offered by InTheBox contains JavaScript code that is designed to collect sensitive information such as credentials and data. 

The code is executed through a malicious overlay interface that is integrated into the mobile application. This overlay interface disguises itself as an input form, tricking the user into entering their sensitive information. 

In many instances, the web injects delivered by InTheBox include a secondary overlay interface that appears to the user as a form. This form requests the user to enter sensitive information such as:-

  • Credit card numbers
  • Expiration dates
  • CVV numbers

An examination of the JavaScript call functions in InTheBox’s web injects uncovered a pattern. The pattern indicated the presence of a similar JS-embedded HTML android web injects that was developed with the intention of collecting credentials from a banking application used by individuals in Brazil. 

The web inject was designed to appear as an overlay interface within the banking app, tricking users into entering their sensitive information which would then be harvested by the web inject’s JavaScript code.

Additionally, it was noted that the same call functions that were found in the Brazilian banking application web inject were also used in another Android web inject. This second web injection targeted a mobile banking application used by individuals in Spain and was discovered in January 2023.

The JavaScript code found in the web inject was observed to be communicating with a C&C server. The server was hosted at MivoCloud SRL, a Moldovan-based offshore hosting service, and its address was:- 

  • http[:]//194[.]180[.]174[.]127/uadmin/gate.php

The Spanish bank mobile application that was targeted by the web inject discovered in January 2023 was also targeted recently by another web inject. This second web inject was observed to communicate with a Command-and-Control (C&C) server located at:-

  • http[:]//85[.]31[.]46[.]136/uadmin/gate.php

The C&C server was hosted by Namecheap, a well-renowned domain registrar, and web hosting provider. 

Recommendations

Here below we have mentioned all the recommendations offered by the security experts:-

  • Make sure to download the apps from official stores only.
  • Always use licensed Anti-viruses.
  • Make sure to keep your device up-to-date with all the latest security updates and patches.
  • Do not open any unknown links received through messages or emails from unknown sources.
  • Make sure to enable Google Play Protect on your Android device.
  • Be cautious while giving permissions to apps.
  • Always keep your installed apps updated.
  • Perform a factory reset on the device as a part of the process to resolve any issues.
  • If a factory reset is not feasible, another alternative is to remove the application.

Network Security Checklist – Download Free E-Book

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication

Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication...

Mozilla Warns Of Firefox Zero-Day Actively Exploited In Cyber Attacks

A critical use-after-free vulnerability affecting Firefox and Firefox Extended Support Release (ESR) is being...

SpyCloud Embeds Identity Analytics in Cybercrime Investigations Solution to Accelerate Insider and Supply Chain Risk Analysis & Threat Actor Attribution

IDLink, SpyCloud’s new automated digital identity correlation capability, is now core to its industry-leading...

Abusix and Red Sift Form New Partnership, Leveraging Automation to Mitigate Cyber Attacks

The agreement has marked over 600,000 fraudulent domains for takedown in just two months...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication

Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication...

Hackers Exploiting Zero-day Flaw in Qualcomm Chips to Attack Android Users

Hackers exploit a zero-day vulnerability found in Qualcomm chipsets, potentially affecting millions worldwide.The flaw,...

Foxit PDF Reader Vulnerability Let Attackers Execute Arbitary Code

Researchers recently disclosed six new security vulnerabilities across various software, as one critical vulnerability...