Tuesday, March 4, 2025
Homecyber securitySingapore Police Arrested Two Individuals Involved in Hacking Android Devices

Singapore Police Arrested Two Individuals Involved in Hacking Android Devices

Published on

SIEM as a Service

Follow Us on Google News

The Singapore Police Force (SPF) has arrested two men, aged 26 and 47, for their suspected involvement in malware-enabled scams targeting Singaporeans since June 2023.

The suspects will be charged in court today.

The SPF, in collaboration with the Hong Kong Police Force (HKPF) and the Royal Malaysia Police (RMP), formed a joint investigation team in November 2023.

Over seven months, the team meticulously traced the complex web of criminal activity and online infrastructure hosting the malware.

The investigation revealed that the two men operated servers to infect victims‘ Android devices with a malicious Android Package Kit (APK) app, allowing them to control the phones and access sensitive information.

The suspects were arrested in Malaysia on June 12, 2024, with the assistance of the RMP, and were handed over to the SPF on June 14, 2024.

Preliminary investigations indicate that the stolen information was used to perform fraudulent transactions on victims’ banking accounts, leading to significant financial losses.

Scan Your Business Email Inbox to Find Advanced Email Threats - Try AI-Powered Free Threat Scan

International Cooperation and Arrests

The SPF’s efforts extended beyond Singapore’s borders.

Information shared with the Taiwan Police led to the takedown of a fraudulent customer service center in Kaohsiung City, Taiwan.

Four individuals were arrested, and assets worth approximately US$1.33 million were seized.

Additionally, the HKPF dismantled 52 malware-controlling servers in Hong Kong and arrested 14 money mules.

Deputy Director of the Criminal Investigation Department, Assistant Commissioner of Police (AC) Paul Tay, expressed gratitude for the international cooperation, stating, “The arrest of these malware operators and dismantling of scam infrastructure demonstrates the resolve of the SPF in fighting scams.”

Public Advisory and Precautionary Measures

The SPF urges the public to be cautious when downloading apps and to adopt the following measures:

  • ADD: Install ScamShield and enable security features like two-factor authentication (2FA) for bank accounts.
  • CHECK: Verify apps with official sources and only download from reputable app stores.
  • TELL: Inform authorities, family, and friends about scams and report any suspicious activity immediately.

If you suspect your phone is infected with malware, switch to flight mode, run an anti-virus scan, and check for unauthorized transactions.

Report any fraudulent activity to your bank and the police promptly.

The SPF remains committed to pursuing criminals, even those operating beyond Singapore’s borders, to ensure the safety and security of its citizens.

Free Webinar! 3 Security Trends to Maximize MSP Growth -> Register For Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Microsoft Strengthens Trust Boundary for VBS Enclaves

Microsoft has introduced a series of technical recommendations to bolster the security of Virtualization-Based...

Hackers Exploiting Business Relationships to Attack Arab Emirates Aviation Sector

A sophisticated cyber espionage campaign targeting the aviation and satellite communications sectors in the...

Microsoft Removing DES Encryption from Windows 11 24H2 and Windows Server 2025″

Microsoft has announced the removal of the Data Encryption Standard (DES) encryption algorithm from...

Researchers Unveil APT28’s Advanced HTA Trojan Obfuscation Tactics

Security researchers have uncovered sophisticated obfuscation techniques employed by APT28, a Russian-linked advanced persistent...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Microsoft Strengthens Trust Boundary for VBS Enclaves

Microsoft has introduced a series of technical recommendations to bolster the security of Virtualization-Based...

Hackers Exploiting Business Relationships to Attack Arab Emirates Aviation Sector

A sophisticated cyber espionage campaign targeting the aviation and satellite communications sectors in the...

Microsoft Removing DES Encryption from Windows 11 24H2 and Windows Server 2025″

Microsoft has announced the removal of the Data Encryption Standard (DES) encryption algorithm from...