The latest version of the FakeCall malware targets Android users by intercepting calls intended for banks, redirecting them to attackers who impersonate bank representatives. Originally reported by Kaspersky in April 2022, FakeCall is a banking trojan that specializes in voice phishing (vishing) attacks.
The malware tricks users into believing they are speaking to legitimate bank officials, making it easier for attackers to gather sensitive information. Recent updates to FakeCall, identified by Zimperium in 2023, reveal enhanced capabilities, including the ability to impersonate over 20 financial institutions, offer fake loan deals, and evade detection through improved techniques.
In its latest variant, FakeCall installs itself as the default call handler on infected devices, which allows it to control both incoming and outgoing calls. This functionality lets the malware mimic the Android dialer interface, displaying the bank’s actual contact information while secretly connecting users to the attacker. Victims are unlikely to suspect the deception, as the fake interface appears authentic.
Additionally, the malware can record live audio and video from compromised devices, enabling attackers to gather valuable information without user interaction. The malware’s developers have added further enhancements to FakeCall, increasing its evasive capabilities. The latest version can now access Android’s Accessibility Service, which provides extensive control over the device’s interface.
This includes monitoring user activity on the dialer, granting permissions, and performing simulated actions like clicks. Furthermore, a new command-and-control (C2) phone listener service allows attackers to issue remote commands, enabling them to manipulate the device’s location data, delete applications, and even access photos stored in the DCIM folder.
Zimperium’s report highlights the ongoing development of FakeCall, suggesting that its operators are actively working to refine the malware and add new capabilities. Recent updates include features like live streaming of the device’s screen, screenshot captures, and control over the device’s lock screen. Indicators of compromise, such as app package names and APK checksums, have been published to help users avoid infected apps, though the attackers frequently update these identifiers. To reduce risks, users are advised to only download applications from trusted sources like Google Play, as sideloading APK files can increase the chances of encountering malware like FakeCall.
Reference: