Monday, November 25, 2024
HomeCyber Security NewsSMSFactory Android Malware Trick Victims to Subscribes to Premium Services

SMSFactory Android Malware Trick Victims to Subscribes to Premium Services

Published on

There has been a warning from security experts about malware first identified as SMSFactory, an Android-based threat. Through the malware, the victims are subscribed to premium services at an unnecessary cost, which is really expensive.

While Avast has not disclosed how many victims have been affected by the attack, there have been hundreds of attempts to infect Android devices utilizing its products across at least eight countries protected by Avast security software.

It is important to note that SMS Factory has more than one distribution channel, including advertisements like:- 

- Advertisement - SIEM as a Service
  • Push notifications
  • Promotional pop-ups
  • Videos promising game hacks
  • Adult content access

Targets

In the period May 2021 to May 2022, SMFactory targeted over 165,000 Android users. While in this attack, most of the users are from the following countries:- 

  • Russia
  • Brazil
  • Argentina
  • Turkey
  • Ukraine

Sending premium SMS texts and making calls to premium phone numbers is the primary objective of SMSFactory. 

One of Avast’s researchers noticed a new variant of malware that can also take advantage of compromised devices’ contact lists as well. There are many ways to distribute information, and among them, one of the main methods is to use compromised contact lists.

Further Analysis

The security experts on the case determined that SMSFactory is available on a number of unofficial app stores during the investigation. Moreover, the malicious APK package on APKMods and PaidAPKFree were also detected by the security analysts at ESET Security.

Various names may be associated with the SMSFactory APK. The first time it tries to install on the device, the Play Protect security system pops a warning message, and then it blocks the whole installation process.

During installation, a number of permissions will be requested from the user, and here they are mentioned below:-

  • Use of the entire screen
  • Accessing location
  • Make phone calls
  • Send SMS
  • Vibrate
  • Track notifications
  • Work from the background to begin activities
  • Manage overlay
  • Wake lock

Once it gets installed, then in the background, the SMSFactory continues all its operations. The SMSFactory establishes a connection with the infected device, and the ID profile of that device is sent over to the C2 server.

Recommendation

To avoid larger bills or to mitigate such situations the cybersecurity researchers have strongly recommended users follow the below-mentioned recommendations:-

  • Don’t download any suspicious applications from untrusted sources.
  • Before downloading any app, you should check all the reviews.
  • Make sure that you always keep the minimum number of applications installed on your device.
  • It is important that you keep your device updated at all times.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...