Sneaky Android Trojan Siphons Millions Using Premium SMS

  /     /     /  
Publicated : 23/11/2024   Category : security


Sneaky Android Trojan Siphons Millions Using Premium SMS


More than 200 applications on the Google Play store have, until recently, allowed cybercriminals to deliver malicious Web content to victims phones, likely garnering tens of millions of dollars.



A heart rate and pulse tracker. A chat translator. A slime simulator. And a fingerprint defender. Using more than 200 such low-key applications, a cybercriminal group created a platform for delivering fraudulent content and siphoned tens of millions of dollars from victims, mobile security firm Zimperium states in a new analysis. 
The platform, which the company dubbed GriftHorse, consists of unassuming Android apps — the most popular of which had less than 1 million downloads; most had far fewer. When installed, these apps would inundate the user with five popup alerts every hour, notifying them they won a free gift. Clicking through the popup leads to a page that asks for the users phone number. If the victim enters their number, the GriftHorse server automatically signs them up for several premium SMS text services.
The understated applications managed to fly under the radar and avoid antivirus detection, says Richard Melick, director of product strategy for endpoint security at Zimperium.
The application themselves are obscurely boring, but there are a lot of them, he says. They are not malware on the surface. Instead, they are actually pulling in Web content in a browser, essentially, and bypassing a lot of security.
The GriftHorse operation has been phenomenally successful. The Trojan applications are installed on between 4 million and 17 million devices, have targeted users in more than 70 countries, and likely generated between €1.2 million and €3.5 million (USD$1.4 million to USD$4.1 million) every month, Zimperium researchers state in their analysis. The campaign has been active since November 2020.
The success of the operation is in its understated programs that did not trigger notifications from antivirus tools or Google Play Protect, the service that scans apps before users download them. The Trojan horse applications did not initially have malicious code but instead downloaded the capabilities after installation, making their true purpose harder to determine.
These cybercriminals took great care not to get caught by malware researchers by avoiding hardcoding URLs or reusing the same domains and filtering [or] serving the malicious payload based on the originating IP address’s geolocation, Zimperium researchers
state in the analysis
. Overall, GriftHorse Android Trojan takes advantage of small screens, local trust, and misinformation to trick users into downloading and installing these Android Trojans, as well frustration or curiosity when accepting the fake free prize spammed into their notification screens.
Almost half of the apps (48%) are classified as tools, while 13% are entertainment. Lifestyle and personalization applications each make up 6%. The rest of the Android apps are scattered across 15 other categories. Google removed the applications after being notified of the scam by Zimperium, the security firm said.
In addition to sneaking past antivirus defenses, the operation succeeded for two other reasons. First, the annoying popups may make the scheme obvious to some users, but others — used to popup advertising — are falling victim to the attack.
Users just want to click [on the ad] and make it go away, Melick says. It takes advantage of the users engagement with their phone.
Second, in most cases, premium SMS subscriptions do not come with a notification and can often be hidden on bills. Vigilant consumers have an advantage in that they can recognize an increase in their monthly bill. Companies, however, may not notice a higher bill if only a few employees phones are compromised, Melick says.
They are managing hundreds of phones on a single bill, so ... this is a rounding error for them, he says. Organizations could be losing money every month because they dont realize this charge is happening.
The successful scheme also highlights the vulnerability of the decades-old service for charging for premium SMS messages, which is a perfect vehicle for fraud, says Melick. Usually, there is no ongoing notice of an impending charge, so users may not know they paying for a premium service until they detect the charge in their bill.
Premium SMS is a relic of pre-Google Play Store and pre-Apple App Store — there is no reason for it to exist anymore, he says. If you want to deliver a legitimate service, you are not going to do it through premium SMS. I cant think of an honest reason — it should be retired to the graveyard of old tech.

Last News

▸ Some DLP Products Vulnerable to Security Holes ◂
Discovered: 23/12/2024
Category: security

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Sneaky Android Trojan Siphons Millions Using Premium SMS