Advertisment

CPR exposes newly discovered malware disguised as legitimate, popular android apps

CPR has spotted a concerning new malware strain, dubbed FluHorse. The malware operates via a set of malicious Android applications.

author-image
VoicenData Bureau
New Update
Phishing edited

Check Point Research (CPR) uncovered a fresh strain of malware that is cleverly disguised as popular Android applications from East Asia.

Advertisment

Check Point Research (CPR) has spotted a concerning new malware strain, dubbed FluHorse. The malware operates via a set of malicious Android applications, each of which mimics a popular and legitimate app with over 100,000 installs. These malicious apps are designed to extract sensitive information, including user credentials and Two-Factor Authentication (2FA) codes. 

Two factor authentication (2FA) can improve security for anyone using an online service or accessing corporate resources. Basically, it requires the user to provide two different types of information to authenticate or prove they are who they say they are before access is granted. 

FluHorse targets multiple sectors in Eastern Asia, and is typically distributed via email. In some cases, high-profile entities such as governmental officials were targeted during the initial stages of the phishing email attack. FluHorse comes as the APAC region is experiencing a major increase in cyberattacks – in the first quarter of 2023, the average organization in APAC was attacked 1,835 times per week according to Check Point Research. This is a 16% increase over the first quarter of 2022.

Advertisment

One of FluHorse’s most worrying aspects is its ability to remain undetected for extended periods of time, making it a persistent and dangerous threat that is difficult to identify. CPR urges businesses and individuals in the affected regions to remain vigilant and take steps to protect themselves against this sophisticated and potentially devastating new malware. 

In this research, CPR describe the different attacks, and provides examples of the phishing malicious applications, compared to the original, legitimate mimicked android apps, showing how difficult it may be to spot the differences.

According to Alexander Chailytko, Cyber Security, Research & Innovation Manager at Check Point Research:“Cyber criminals are targeting organizations and individuals in Taiwan and Vietnam, amongst others, with a new, sophisticated type of Malware called FluHorse. By mimicking popular mobile apps for banking, transportation and toll collection, the hackers are trying to steal sensitive information that can be used to bypass two factor authorization (2FA) and gain access to the victim’s accounts.”

Advertisment

Mimicked applications

Cybercriminals often opt for popular apps with a high number of downloads to maximize the impact of their attack and gain greater traction. The attackers chose an eclectic selection of targeted sectors for specific countries, using one mimicked application in each country: 

For example it mimics VP Bank NEO in Vietnam, and ETC APK in Taiwan and both the applications have above 1 million installs respectively.

Advertisment

Attackers targeted these mimicked applications from reputable companies because they are confident that such applications will attract financially stable customers. This is because the companies behind these applications have a solid reputation for trustworthiness. 

Phishing scheme

After the victim enters their credentials, it is sent to a server controlled by the attackers (C&C server). The malware then tells the victim to hold while the information is being processed. At the same time, the malware starts intercepting all incoming text messages, including any codes sent for two-factor authentication. If the attackers have stolen the victim's login credentials or credit card information, they can use this to bypass the 2FA and gain access to the victim's accounts.

Advertisment

Luring victims to download the mimicked apps

Phishing emails are one of the most common cyber threats that an organization and individuals may face. Phishing attacks can be used to accomplish a variety of goals for an attacker including stealing user credentials, data, and money, as well as delivering malware to a recipient’s computer or luring the victim to download a file. 

CPR discovered multiple high-profile entities among the recipients of these specific emails in this attack, including employees from the government sector and large industrial companies.

Advertisment

Remain protected against Mobile Threats 

As the human factor remains an important factor in similar attacks, Check Point Research recommends the following suggestions for mobile device users:

  • Check Point’s Harmony Mobile prevents malware from infiltrating mobile devices by detecting and blocking the download of malicious apps in real-time. Harmony Mobile’s unique network security infrastructure – On-device Network Protection – allows you to stay ahead of emerging threats by extending Check Point’s industry-leading network security technologies to mobile devices.
  • Users are advised to remain vigilant and refrain from clicking on links arriving by emails or texts from unknown sources.
Advertisment

How to Identify a Spoofed Email

Spoofed emails are part of phishing campaigns, which are designed to trick the recipient into taking some action that helps the attacker. If an email has an embedded link to click, an attachment, or requests some other action, then it is wise to check it for spoofing.

In some cases, the attacker may use a real, lookalike address, such as substituting cornpany.com for company.com. In others, the value of the FROM header may be replaced with a legitimate address that is not under the sender’s control.

While the first case can usually be detected by taking a careful look at the sender’s email address, the second might require more digging. Spoofed FROM addresses can be identified based on:

  • Context: Phishing emails are designed to look legitimate, but they may not always succeed. If an email doesn’t sound like it came from the alleged sender, it may be a spoofed phishing email. However, cyber criminals are starting to use artificial intelligence (AI) to generate realistic phishing emails, making additional scrutiny necessary. 
  • Reply-To: A Reply-To address enables replies to an email from one address to be directed to another. While this has legitimate uses (such as mass email campaigns), it is unusual and should be cause for suspicion for emails coming from a personal account.
  • Received: The RECEIVED header in an email indicates the IP addresses and domain names of the computers and email servers along the path that the email traveled. An email from and to email addresses within the same company should only pass through the company’s email server.
Advertisment