What Is FakeBank? New Banking Malware Can Intercept SMS Messages to Steal Sensitive Data and Funds

10. January 2018.

Once installed on an infected phone, the malware replaces the default SMS management programme on the device, replaces it with its own and hides the icon. This allows the malicious software to monitor and analyse every SMS received and even delete messages.

“This means that any verification or query from the bank to the user can be intercepted and removed. It can even call an assigned phone number, send specified SMS, and steal call logs and contact lists,” the researchers said. “Most significantly, all this access to the device’s SMS gives the malware an avenue to silently steal money from users’ bank account.”

Besides controlling the device’s open and close network function, the malicious app can quietly connect to the internet and send the stolen information to its command and control server (C&C) without the user’s knowledge.

Since many users link their bank accounts to their phones and opt to receive text notifications, the malware can take over these messages to steal sensitive bank account information, such as security code messages. Threat actors can then use the stolen data to log in to victims’ online banking accounts, reset the passwords and covertly transfer money to their own accounts.

FakeBank can also steal sensitive information from the device including users’ phone numbers, a list of banking apps installed, the balance on a linked bank card and location data. The researchers observed some samples of the malware requesting admin privileges from the user, therefore allowing the malicious app further access to the compromised device.

After the malware is installed, the icon appears on the device screen and requests admin privileges from the userTrend Micro

“FakeBank also stops the user from opening the target bank’s legitimate app, to prevent any modifications to the relationship between the bank card number and your phone number,” the researchers said. “We can assume that the malware developer is very familiar with the bank message format and transfer process, as all the payment SMS notifications are noted and scrambled by C&C.”

To ensure it carries out its malicious activities successfully, the malware prevents users from opening device settings “likely to prevent installation”, the researchers said. It also inspects the device for any anti-virus software and quietly exits without doing anything if it does find one.

“This is a tactic that helps it remain unreported and under the radar,” Trend Micro explains. “One of the notable elements of this malware is the way it hides its payload. The malware has different behaviours that make it harder for infected users to get rid of it, and for security solutions to detect it.

“It actually uses three different methods to obfuscate the malicious payload. The techniques range in complexity and the developers seem to be taking a multilayered approach to avoid exposure.”

Most of FakeBank’s C&C domains have IP addresses located in Warmia-Masuria province in Poland and Russia, the researchers said. They also noted that most of these addresses are registered by a company called Wuxi Yilian which has previously been linked to other fraudulent domains.

More from IBTimes UK:

  • Russia-linked Turla hackers using Adobe Flash update to drop malware, steal data from embassies
  • Malware found mining cryptocurrency and sending coins to North Korea
  • LightsOut: New adware found infesting 22 flashlight apps with over 1.5 million downloads
  • Related topics :Russia
    ShareMore

  • Stay up to datewith our daily newsletter
    YOU MIGHT LIKE THISSponsored Content by Taboola

    Fintech Focus weekly

    Keep up with the latest in blockchain, cryptocurrency and other fintech news.
    Straight to your inbox every Friday.
    Sign up now
    • About IBT
    • Leadership
    • Meet the team
    • Advertise
    • Brand
    • Terms of service
    • Privacy
    • Permission
    • Content Licensing
    • Contact
      Editions:

    • Australia
    • China
    • India
    • U.K.
    • U.S.
      © Copyright 2018 IBTimes Co., Ltd. All Rights Reserved.FacebookTwitterLinkedinGoogle PlusRSS
    0 0 votes
    Article Rating

    Subscribe
    Notify of
    guest
    0 Comments
    Inline Feedbacks
    View all comments
    0
    Would love your thoughts, please comment.x
    ()
    x
    Register New Account
    Login to Detarplus.com
    Reset Password