A campaign that began late last year targeting eight different Malaysian banks is still targeting its customers with three malicious Android applications.
Under the guise of seemingly harmless shopping apps, the threat actors in this campaign have misled users into installing malicious applications. As a way to get people to download the applications, some of the websites copy the original to the point of outright copying.
The security experts at Slovak cybersecurity firm ESET stated:-
“In these attacks or campaigns, malicious websites were set up by the attackers to trick users into downloading the malicious apps by appearing as legitimate, but fraudulent, websites.”
In addition to stealing credentials, the apps allow attackers to forward all SMS messages from the victim that include 2FA codes sent by their banks to the malware operators.
In total, the threat actors have targeted 8 Malaysian banks, and here we have mentioned them all:-
Here the threat actors have copied the websites of the cleaning services and a pet store:-
In this latest campaign, all the websites are seen using domain names whose domain names are similar to those of the services that they pretend to represent.
Along with the security analysts at ESET, the MalwareHunterTeam has claimed:-
“Facebook ads are also used by the attackers to distribute the fake websites they have created. As a result, it was also discovered that there are three other malicious websites and Android trojans associated with the campaign.”
The attack depends on the potential victim enabling the non-default “Install unknown apps” option on their device for it to succeed. Because of this, five of the services that are abused don’t even have a Google Play app, which makes matters worse.
As soon as the app is launched, the user will be prompted to sign in. Doing so will allow them to place false orders and then they will be presented with different options to accept payments from their bank accounts in order to complete the checkout process.
Campaigns such as this are mainly designed to obtain users’ banking credentials and exfiltrate them to a server that is controlled by the attacker. During this process, they will display an error message about an invalid user ID or password entered.
Moreover, the ESET malware researcher, Lukáš Štefanko stated:-
“While the campaign targets Malaysia exclusively, for now, it might expand to other countries and banks later on. At this time, the attackers are after banking credentials, but they may also enable the theft of credit card information in the future.”
Here below we have mentioned all the recommended mitigations:-
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.
The Evasive Panda group deployed a new C# framework named CloudScout to target a Taiwanese…
Researchers warn of ongoing spear-phishing attacks by Russian threat actor Midnight Blizzard targeting individuals in…
The Ukrainian Cyber Emergency Response Team discovered a targeted phishing campaign launched by UAC-0215 against…
Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors to…
A security researcher discovered a vulnerability in Windows theme files in the previous year, which…
The ongoing Meta malvertising campaign, active for over a month, employs an evolving strategy to…