Categories: Torjan Horses/worms

Trojans Stealing Money From User Accounts Using WAP-billing mobile payment

WAP-billing Trojans in raise from the second Quater of 2017 and they are targeting users from India and Russia, seems these Trojans were developed at the end of 2016 and at the beginning of 2017.

These Trojans distributed like more useful apps such as Battery saver and Ram Optimizer, but it additionally does have malware capabilities.

WAP-billing is a mobile payment feature that charges directly to the user’s mobile bill so that they don’t require to register a credit card or establish a username and positive identification.

For WAP-billing the user needs to connect to the Internet through mobile data, with mobile data only the network operator can identify him/her by IP address. It was discovered by Roman Unuchek.

Generally these Trojan’s first turn off your WiFi connection and then turn on mobile Internet. They do this because WAP-billing works only through mobile Internet. Then they open a web page that redirects to the page with WAP-billing.
Usually, Trojans load such pages and click on buttons utilizing JavaScript (JS) files After that, they have to delete incoming SMS messages containing data regarding subscriptions from the mobile network operator.

Trojan Clickers AndroidOS.Ubsod & Xafekopy

Roman Unuchek from Kaspersky labs identified Trojan Trojan.AndroidOS.Boogr.gsh and it belongs to Trojan-Clicker.AndroidOS.Ubsod malware family.

It is a simple Trojan which pretends like an advertising software, but it is capable of deleting all incoming message that has “ubscri” (part of “Subscription”).

He detected another Trojan as Trojan-Clicker.AndroidOS.Xafekopy which uses JS files similar to Ztorg’s to click on buttons of the web page. It was created by Chinese developers and targeting India(37%) and Russian(32%) users.

Files are distributed in two versions one with Indian links and another with Russian links. These applications once installed loads files from its origin folder which has all the major functionalities. By using this JS they can bypass captcha forms on web pages.

And the Trojan Trojan-Clicker.AndroidOS.Autosus.a is designed to steal money with WAP-billing by using clickjacking methods and also has the ability to hide incoming messages as per commands from C&C server.

Priya James

View Comments

Recent Posts

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search…

21 hours ago

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the…

22 hours ago

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains, posing…

22 hours ago

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware,…

22 hours ago

RansomHub Ransomware Group Hits 84 Organizations as New Threat Actors Emerge

The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of…

22 hours ago

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…

1 day ago