Monday, March 4, 2024

Over 1800 Android Mobile App Web Injects for Sale on Hacking Forums

Cyble Research and Intelligence Labs (CRIL) is a security research organization that has been monitoring the actions of a group of cyber criminals called “InTheBox”. 

This group is primarily active on a Russian-language cybercrime forum, where they engage in illegal activities such as hacking, fraud, and other forms of cybercrime.

InTheBox operates an online shop that is accessible through the anonymizing network Tor. This shop sells tools and services for carrying out cybercrime, such as “web injects.” 

This web injects are pieces of malicious code that can be used to manipulate and steal sensitive information from victims who use infected Android devices for banking activities. 

The shop has been expanding its inventory by adding new web injects that are compatible with various Android banking malware. This web injects are being sold at low prices and with attractive discounts, making them appealing to other cybercriminals.

The Threat Actor provided web injects that aimed to compromise various types of financial services, including retail banking, mobile payment platforms, cryptocurrency exchanges, and e-commerce apps run by well-known companies in numerous countries like:-

  • Australia
  • Brazil
  • India
  • Indonesia
  • Japan
  • Kuwait
  • Malaysia
  • Philippines
  • Qatar
  • Saudi Arabia
  • Singapore
  • Thailand
  • The United States

Android Mobile App Web Inject Packages

InTheBox is a well-established player in the cybercrime market, with a verified history of selling web injects for Android mobile applications since February 2020. 

They run an online shop that is accessible through the Tor network, providing an anonymous and secure platform for the sale of their malicious products. The shop is automated, allowing for quick and efficient transactions for customers looking to buy web injects.

The prices for the unlimited web inject packages were listed as follows on the online shop:-

  • 814 web injects compatible with Alien, Ermac, Octopus, and MetaDroid for USD 6,512
  • 495 web injects compatible with Cerberus for USD 3,960
  • 585 web injects compatible with Hydra for USD 4,680

InTheBox has lowered the cost for single web injects from USD 50 to USD 30 each. Additionally, for any banking malware bot, they also offer a customized web inject development service.

Web Injects Shared as Archive

InTheBox provides web injects which are typically packaged in a compressed archive. The archive contains two elements:- 

  • An app icon in PNG format
  • An HTML file

The HTML file included in the web injects offered by InTheBox contains JavaScript code that is designed to collect sensitive information such as credentials and data. 

The code is executed through a malicious overlay interface that is integrated into the mobile application. This overlay interface disguises itself as an input form, tricking the user into entering their sensitive information. 

In many instances, the web injects delivered by InTheBox include a secondary overlay interface that appears to the user as a form. This form requests the user to enter sensitive information such as:-

  • Credit card numbers
  • Expiration dates
  • CVV numbers

An examination of the JavaScript call functions in InTheBox’s web injects uncovered a pattern. The pattern indicated the presence of a similar JS-embedded HTML android web injects that was developed with the intention of collecting credentials from a banking application used by individuals in Brazil. 

The web inject was designed to appear as an overlay interface within the banking app, tricking users into entering their sensitive information which would then be harvested by the web inject’s JavaScript code.

Additionally, it was noted that the same call functions that were found in the Brazilian banking application web inject were also used in another Android web inject. This second web injection targeted a mobile banking application used by individuals in Spain and was discovered in January 2023.

The JavaScript code found in the web inject was observed to be communicating with a C&C server. The server was hosted at MivoCloud SRL, a Moldovan-based offshore hosting service, and its address was:- 

  • http[:]//194[.]180[.]174[.]127/uadmin/gate.php

The Spanish bank mobile application that was targeted by the web inject discovered in January 2023 was also targeted recently by another web inject. This second web inject was observed to communicate with a Command-and-Control (C&C) server located at:-

  • http[:]//85[.]31[.]46[.]136/uadmin/gate.php

The C&C server was hosted by Namecheap, a well-renowned domain registrar, and web hosting provider. 

Recommendations

Here below we have mentioned all the recommendations offered by the security experts:-

  • Make sure to download the apps from official stores only.
  • Always use licensed Anti-viruses.
  • Make sure to keep your device up-to-date with all the latest security updates and patches.
  • Do not open any unknown links received through messages or emails from unknown sources.
  • Make sure to enable Google Play Protect on your Android device.
  • Be cautious while giving permissions to apps.
  • Always keep your installed apps updated.
  • Perform a factory reset on the device as a part of the process to resolve any issues.
  • If a factory reset is not feasible, another alternative is to remove the application.

Network Security Checklist – Download Free E-Book

Website

Latest articles

US Court Orders NSO Group to Handover Code for Spyware, Pegasus to WhatsApp

Meta, the company that owns WhatsApp, filed a lawsuit against NSO Group in 2019....

New SSO-Based Phishing Attack Trick Users into Sharing Login Credentials  

Threat actors employ phishing scams to trick individuals into giving away important details like...

U.S. Charged Iranian Hacker, Rewards up to $10 Million

The United States Department of Justice (DoJ) has charged an Iranian national, Alireza Shafie...

Huge Surge in Ransomware-as-a-Service Attacks targeting Middle East & Africa

The Middle East and Africa (MEA) region has witnessed a surge in ransomware-as-a-service (RaaS)...

New Silver SAML Attack Let Attackers Forge Any SAML Response To Entra ID

SolarWinds cyberattack was one of the largest attacks of the century in which attackers...

AI Worm Developed by Researchers Spreads Automatically Between AI Agents

Researchers have developed what they claim to be one of the first generative AI...

20 Million+ Cutout.Pro User Records Leaked On Hacking Forums

CutOut.Pro, an AI-powered photo and video editing platform, has reportedly suffered a data breach,...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles