DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Incidents

‘FakeCalls’ Android malware resurfaces

March 17, 2023
Reading Time: 2 mins read
in Incidents

 

A new version of Android malware called FakeCalls, which imitates phone calls from over 20 financial institutions in South Korea, is being circulated once again.

This is not a new piece of malware, as Kaspersky reported on it a year ago, but researchers from Check Point have discovered newer versions that have implemented several new evasion mechanisms not seen in previous samples.

The malware is distributed on fake banking apps that impersonate legitimate financial institutions in South Korea.

Victims are tricked into installing the malware via phishing, black SEO, or malvertizing.

Once the malware is installed, it initiates a phone call that plays a recording from the bank’s customer support with instructions on getting a loan request approved.

The malware then tricks the victim into confirming their credit card details, supposedly required for receiving the loan, which are then stolen by the attackers.

In addition to the voice phishing process, FakeCalls can capture live audio and video streams from the compromised device, which could help the attackers collect additional information. In the latest samples captured by Check Point’s researchers, the malware incorporates three new techniques to evade detection.

The first mechanism is called ‘multi-disk,’ which involves manipulating the ZIP header data of the APK file, setting abnormally high values for the EOCD record to confuse automated analysis tools. The second evasion technique involves the manipulation of the AndroidManifest.xml file to make its starting marker indistinguishable, modify the strings.

Finally, the third evasion method is to add many files inside nested directories in the APK’s asset folder, resulting in file names and paths surpassing 300 characters.

South Korean government statistics show that vishing (voice phishing) cost victims in the country $600 million in 2020 alone, while there have been 170,000 reported victims between 2016 and 2020.

While FakeCalls has stayed in South Korea, the malware could easily expand its operations to other regions if its developers or affiliates develop a new language kit and app overlay to target banks in different countries.

With the rise of machine-learning speech models that can generate natural speech and mimic real persons’ voices with minimal training data input, vishing is poised to become an even greater threat shortly.

Read More

Tags: Cyber AttacksCyber securityFakeCallsincidentsIncidents 2023malwaresMarch 2023PhishingPhishing attacksSouth Korea
1
VIEWS
ADVERTISEMENT

Related Posts

KillNet Anonymous Sudan targets Australia

KillNet Anonymous Sudan targets Australia

March 30, 2023
Pakistan’s Supreme Court website attacked

Pakistan’s Supreme Court website attacked

March 30, 2023
SafeMoon liquidity pool hacked, $8.9M stolen

SafeMoon liquidity pool hacked, $8.9M stolen

March 30, 2023
DarkBit sells data from Israeli university

DarkBit sells data from Israeli university

March 30, 2023

More Articles

Book

Cyberinsurance Policy – Book

February 26, 2023

Distributed Ledger Technology (DLT)

February 25, 2021
Alerts

This new phishing attack is ‘sneakier than usual’, Microsoft warns

August 2, 2021
Incidents

Damart clothing store hit by Hive Ransomware

September 2, 2022

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.