-->
Hackers Using Imitation Cellular Telephone Towers To Spread Android Banking Trojan

Hackers Using Imitation Cellular Telephone Towers To Spread Android Banking Trojan

Hackers Using Imitation Cellular Telephone Towers To Spread Android Banking Trojan

 Chinese Hackers direct maintain taken Smishing laid upwards on to the side past times side degree Hackers Using Fake Cellphone Towers to Spread Android Banking Trojan
Chinese Hackers direct maintain taken Smishing laid upwards on to the side past times side level, using rogue jail στοιχείο telephone towers to distribute Android banking malware via spoofed SMS messages.

SMiShing — phishing attacks sent via SMS — is a type of laid upwards on wherein fraudsters role release spoofing laid upwards on to shipping convincing bogus messages to play tricks mobile users into downloading a malware app onto their smartphones or lures victims into giving upwards sensitive information.

Security researchers at Check Point Software Technologies direct maintain uncovered that Chinese hackers are using fake base of operations transceiver stations (BTS towers) to distribute "Swearing Trojan," an Android banking malware that 1 time appeared neutralized later on its authors were arrested inwards a police draw raid.

This is the rootage e'er reported real-world illustration inwards which criminals played smart inwards such a agency that they used BTS — a slice of equipment commonly installed on mobile telephone towers — to spread malware.

The phishing SMS, which masquerades itself every bit the 1 coming from Chinese telecom service providers PRC Mobile as well as PRC Unicom, contains real convincing text amongst a link to download malicious Android APK.

Since Google Play Store is blocked inwards China, the SMS easily tricks users into installing the APK from an untrusted source.
"Using a BTS to shipping simulated messages is quite sophisticated, as well as the SMS content is real deceptive. The message tricks users into clicking a malicious URL which installs malware," the researchers said inwards the blog post.
Once installed, the Swearing malware distributes itself past times sending automated phishing SMSes to a victim's contacts.

However the maximum gain of a BTS antenna may hold out every bit depression every bit 10-22 miles, the technique is real successful as well as sophisticated inwards targeted attacks.

Discovered final twelvemonth past times Tencent Security researchers, the Swearing Trojan has the capability to bag banking concern credentials as well as other sensitive information from victim Android devices as well as to bypass two-factor authentication past times replacing a user's legit SMS app amongst a malicious version that intercepts incoming SMS messages.

What's to a greater extent than interesting? To avoid detection of whatsoever malicious activity, the Swearing trojan doesn't connect to whatsoever remote command-and-control (C&C) server. Instead, it uses SMS or emails to shipping stolen information dorsum to the hackers.
"This provides the malware amongst expert encompass for its communications as well as hinders attempts to describe whatsoever malicious activity."
While this detail malware drive has commonly targeted Chinese users, Check Point researchers warned inwards a weblog post that the threat could chop-chop spread worldwide when adopted past times Western malware.

The malware system seems to hold out larger than previously thought, every bit according to researchers, alone 21cn.com e-mail addresses were used inwards the initial malware campaign, acre novel attacks used other pop Chinese e-mail service providers, such every bit 163.com, sina.cn, as well as qq.com, as well as Alibaba Cloud as well as other cloud service hosted e-mail accounts every bit well.

Check Point likewise points out the nasty HummingBad malware trojan that was likewise discovered inwards the Chinese mobile market, as well as "turned out to hold out early on birds which continued to spread worldwide" if adopted past times western malware.
Blogger
Disqus
Pilih Sistem Komentar

No comments

Advertiser