CYBER 101

  • Alerts
  • Blog
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Domains
  • FAQ
  • Incidents
  • News
  • Tutorials

Subscribe to our newsletter

No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
  • Jobs
  • Vendors
Get Help
CyberMaterial
Home Incidents

‘FakeCalls’ Android malware resurfaces

March 17, 2023
Reading Time: 2 mins read
in Incidents

 

A new version of Android malware called FakeCalls, which imitates phone calls from over 20 financial institutions in South Korea, is being circulated once again.

This is not a new piece of malware, as Kaspersky reported on it a year ago, but researchers from Check Point have discovered newer versions that have implemented several new evasion mechanisms not seen in previous samples.

The malware is distributed on fake banking apps that impersonate legitimate financial institutions in South Korea.

Victims are tricked into installing the malware via phishing, black SEO, or malvertizing.

Once the malware is installed, it initiates a phone call that plays a recording from the bank’s customer support with instructions on getting a loan request approved.

The malware then tricks the victim into confirming their credit card details, supposedly required for receiving the loan, which are then stolen by the attackers.

In addition to the voice phishing process, FakeCalls can capture live audio and video streams from the compromised device, which could help the attackers collect additional information. In the latest samples captured by Check Point’s researchers, the malware incorporates three new techniques to evade detection.

The first mechanism is called ‘multi-disk,’ which involves manipulating the ZIP header data of the APK file, setting abnormally high values for the EOCD record to confuse automated analysis tools. The second evasion technique involves the manipulation of the AndroidManifest.xml file to make its starting marker indistinguishable, modify the strings.

Finally, the third evasion method is to add many files inside nested directories in the APK’s asset folder, resulting in file names and paths surpassing 300 characters.

South Korean government statistics show that vishing (voice phishing) cost victims in the country $600 million in 2020 alone, while there have been 170,000 reported victims between 2016 and 2020.

While FakeCalls has stayed in South Korea, the malware could easily expand its operations to other regions if its developers or affiliates develop a new language kit and app overlay to target banks in different countries.

With the rise of machine-learning speech models that can generate natural speech and mimic real persons’ voices with minimal training data input, vishing is poised to become an even greater threat shortly.

Read More

Tags: Cyber AttacksCyber securityFakeCallsincidentsIncidents 2023malwaresMarch 2023PhishingPhishing attacksSouth Korea
1
VIEWS
ADVERTISEMENT

Related Posts

Ferrari Hacked, Refuses Ransom

Ferrari Hacked, Refuses Ransom

March 21, 2023
DOCOMO Pacific Reports Cyber Incident

DOCOMO Pacific Reports Cyber Incident

March 21, 2023
Mispadu trojan targets LATAM countries

Mispadu trojan targets LATAM countries

March 21, 2023
Public school data on the Dark Web

Public school data on the Dark Web

March 21, 2023

More Articles

Inside a purple team: Pentesting, vulnerabilities and other key skills

July 15, 2022
Course

IBM Cybersecurity Analyst Professional Certificate

September 3, 2020
Quotes

“Technology like art is a…”

November 3, 2020
Alerts

Red Hat security advisory (AV22-440)

August 10, 2022

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.