Cyble Research and Intelligence Labs (CRIL) is a security research organization that has been monitoring the actions of a group of cyber criminals called “InTheBox”.
This group is primarily active on a Russian-language cybercrime forum, where they engage in illegal activities such as hacking, fraud, and other forms of cybercrime.
InTheBox operates an online shop that is accessible through the anonymizing network Tor. This shop sells tools and services for carrying out cybercrime, such as “web injects.”
This web injects are pieces of malicious code that can be used to manipulate and steal sensitive information from victims who use infected Android devices for banking activities.
The shop has been expanding its inventory by adding new web injects that are compatible with various Android banking malware. This web injects are being sold at low prices and with attractive discounts, making them appealing to other cybercriminals.
The Threat Actor provided web injects that aimed to compromise various types of financial services, including retail banking, mobile payment platforms, cryptocurrency exchanges, and e-commerce apps run by well-known companies in numerous countries like:-
InTheBox is a well-established player in the cybercrime market, with a verified history of selling web injects for Android mobile applications since February 2020.
They run an online shop that is accessible through the Tor network, providing an anonymous and secure platform for the sale of their malicious products. The shop is automated, allowing for quick and efficient transactions for customers looking to buy web injects.
The prices for the unlimited web inject packages were listed as follows on the online shop:-
InTheBox has lowered the cost for single web injects from USD 50 to USD 30 each. Additionally, for any banking malware bot, they also offer a customized web inject development service.
InTheBox provides web injects which are typically packaged in a compressed archive. The archive contains two elements:-
The HTML file included in the web injects offered by InTheBox contains JavaScript code that is designed to collect sensitive information such as credentials and data.
The code is executed through a malicious overlay interface that is integrated into the mobile application. This overlay interface disguises itself as an input form, tricking the user into entering their sensitive information.
In many instances, the web injects delivered by InTheBox include a secondary overlay interface that appears to the user as a form. This form requests the user to enter sensitive information such as:-
An examination of the JavaScript call functions in InTheBox’s web injects uncovered a pattern. The pattern indicated the presence of a similar JS-embedded HTML android web injects that was developed with the intention of collecting credentials from a banking application used by individuals in Brazil.
The web inject was designed to appear as an overlay interface within the banking app, tricking users into entering their sensitive information which would then be harvested by the web inject’s JavaScript code.
Additionally, it was noted that the same call functions that were found in the Brazilian banking application web inject were also used in another Android web inject. This second web injection targeted a mobile banking application used by individuals in Spain and was discovered in January 2023.
The JavaScript code found in the web inject was observed to be communicating with a C&C server. The server was hosted at MivoCloud SRL, a Moldovan-based offshore hosting service, and its address was:-
The Spanish bank mobile application that was targeted by the web inject discovered in January 2023 was also targeted recently by another web inject. This second web inject was observed to communicate with a Command-and-Control (C&C) server located at:-
The C&C server was hosted by Namecheap, a well-renowned domain registrar, and web hosting provider.
Here below we have mentioned all the recommendations offered by the security experts:-
Network Security Checklist – Download Free E-Book
The Evasive Panda group deployed a new C# framework named CloudScout to target a Taiwanese…
Researchers warn of ongoing spear-phishing attacks by Russian threat actor Midnight Blizzard targeting individuals in…
The Ukrainian Cyber Emergency Response Team discovered a targeted phishing campaign launched by UAC-0215 against…
Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors to…
A security researcher discovered a vulnerability in Windows theme files in the previous year, which…
The ongoing Meta malvertising campaign, active for over a month, employs an evolving strategy to…