They redirect potential victims to fake malware download sites
Cybercriminals create fake pages to obtain confidential data EFE/Sascha Steinbach
Investigators of cybersecurity identified malicious apps used to steal banking credentials from customers of eight Malaysian banks. The experts shared details of this deception as a preventive measure since this technique could be replicated throughout the world.
Cybercriminals are trying to steal bank details using fake websites posing as legitimate services. They generally use domain names very similar to official services and even directly copy the design of the original site to go unnoticed, Eset explains.
This campaign was identified by first time in late 2021. Back then hackers posed as legitimate cleaning service Maid4u. The hoax was distributed through Facebook advertisements, asking potential victims to download the app, which actually contained malicious content.
In January 2022, MalwareHunterTeam shared information about three other malicious sites and Android Trojans attributed to this campaign. In addition to that, the Eset researchers found four other fake websites. All seven sites were impersonating services that are only available in Malaysia: ssix of them offer cleaning services, such as Grabmaid, Maria’s Cleaning, Maid4u, YourMaid, Maideasy and MaidACall, while eThe seventh is a pet store called PetsMore.
These fake websites do not provide the option to purchase directly through them. Instead, they include links to supposedly download apps from Google Play. By clicking on these links, the user is not actually redirected to the official Google store but to servers controlled by cybercriminals.
“To be successful, this attack requires that victims enable the ‘Install unknown apps’ option on your devices, which is disabled by default. It is worth mentioning that five of the seven legitimate versions of these services do not even have an application available on Google Play”, highlighted Camilo Gutiérrez Amaya, Head of the Research Laboratory of Eset Latin America.
After choosing the direct transfer option, victims are presented with a fake FPX (Eset) payment page
To appear legitimate, the apps ask users to log in once they are opened. The software takes any user input and always declares it correct. Maintaining the appearance of a real online store, the malicious applications pretend to offer products and services for purchase using an interface similar to that of the original stores.
When it comes time to pay for the purchase, victims are presented with two payment options: they can pay by credit card or by bank transfer.
Thus, attackers obtain their victims’ banking credentials. After choosing the direct transfer option, victims are presented with a fake FPX payment page and they are asked to choose a bank from eight Malaysian bank options and then enter their credentials. The banks targeted by this malicious campaign are Maybank, Affin Bank, Public Bank Berhad, CIMB Bank, BSN, RHB, Bank Islam Malaysia and Hong Leong Bank.
After victims send their banking credentials, get an error message informing them that the username or password they provided is invalid. At this point, the entered credentials have already been sent to the malware operators.
In order to ensure that the operators behind this campaign can access the bank accounts of their victims, the Fake online store apps also forward to the attackers all the SMS messages the victim receives in case any of those messages contain the two-step authentication (2FA) code sent by the bank.
According to the research team, until now this malware campaign has been targeting only Malaysia: both the online stores whose identity it impersonates, as well as the banks targeted for the theft of customer credentials, are from this country, and the prices of the Applications are displayed in the local currency, the Malaysian Ringgit.
To protect yourself against these types of threats, you should do the following:
1. Only enter legitimate websites. Do not enter from links that are received or seen on networks because you could be redirected to a false page
2. Be careful when clicking on advertisements and do not follow the results provided by paid search engines as they may not lead to the official website.
3. Pay attention to the source of the apps you are downloading. Make sure you are redirected to the Google Play store when you get an app.
4. Enable two-step verification whenever possible. This note explains how to do it in detail, both in email and social networks and other accounts.
Instead of taking SMS as a second factor; It is convenient to opt for the use of codes that come from applications such as Google Authenticator or physical keys.
5. Keep the software updated.
6. Use a security solution.
Dear readers, the online edition joins the Front Pickup initiative and starts raising funds for a car for Ukraine defenders, which we plan to drive from abroad.
The Mitsubishi l200 SUV is already awaiting redemption. We have a few days. Help our soldiers get the right car.
Paypal stopruorg@gmail.com
Ethereum: 0x8ecf8dB15ef228331b87620c25383707fC6f3f57