www.mcafee.com
Open in
urlscan Pro
104.110.24.72
Public Scan
URL:
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/android-phishing-scam-using-malware-as-a-service-on-the-rise-in-in...
Submission: On March 15 via api from TR — Scanned from DE
Submission: On March 15 via api from TR — Scanned from DE
Form analysis
4 forms found in the DOMhttps://www.mcafee.com/blogs
<form class="desktop-search-form-v2" action="https://www.mcafee.com/blogs">
<div><span class="search_icon_desktop"> <img src="/blogs/wp-content/themes/securingtomorrow-brillio/img/new-icons/search_icon_black.svg" alt="search grey icon"> </span></div>
<div class="desktop-search-div"><input class="dsk-search" autocomplete="off" name="s" type="text" placeholder="Search"></div>
</form>
https://www.mcafee.com/blogs
<form class="desktop-search-form" style="display: none;" action="https://www.mcafee.com/blogs">
<div class="desktop-search-div"><input class="dsk-search" autocomplete="off" name="s" type="text" placeholder="Type and hit enter..."></div>
<div><span class="close_icon_desktop"> <img src="https://www.mcafee.com/blogs/wp-content/themes/securingtomorrow-brillio/img/new-icons/cross-grey-icon.svg" alt="close grey icon"> </span></div>
</form>
https://www.mcafee.com/blogs
<form class="form-inline my-2 my-lg-0" action="https://www.mcafee.com/blogs">
<div class="input-group mb-3 search-div">
<div class="input-group-append"><button class="sarch-btn" type="button"><span class="fa fa-search" title="Type and hit enter..."><span style="display: none;">.</span></span> </button>
</div>
</div>
</form>
https://www.mcafee.com/blogs
<form action="https://www.mcafee.com/blogs" class="desktop-search-form" style="display: none;">
<div class="desktop-search-div">
<input class="dsk-search" name="s" type="text" placeholder="Type and hit enter..." autocomplete="off">
</div>
<div><span class="close_icon_desktop">
<img src="https://www.mcafee.com/blogs/wp-content/themes/securingtomorrow-brillio/img/new-icons/cross-grey-icon.svg" alt="close grey icon">
</span>
</div>
</form>
Text Content
* Products * All-In-One Protection * NEW McAfee+ Individual Plans Complete privacy, identity and device protection for individuals. * NEW McAfee+ Family Plans Complete privacy, identity and device protection for up to 6 family members. * Other Products & Services * Antivirus * Scam Protection * Virtual Private Network (VPN) * Mobile Security * PC Optimizer * TechMaster Concierge * McAfee Assist * Free Tools & Downloads * Web Protection * Free Antivirus Trial * Device Security Scan * Password Generator * Features * Keep Me Private Online * Personal Data Cleanup * Online Account Cleanup * VPN (Virtual Private Network) * Social Privacy Manager * Safeguard My Identity * Identity Monitoring * Credit Monitoring * Security Freeze * Identity Theft Coverage & Restoration * Password Manager * Protect My Devices * Antivirus * Scam Protection * Web Protection * Protect My Family * Protection Score * Parental Controls * Family Plans * Resources * Stay Updated * McAfee Blog * Reports and Guides * McAfee on YouTube * Prevent Spam and Phishing * Learn More * Learn at McAfee * What is Antivirus? * What is a VPN? * What is Identity Theft? * Press & News * McAfee Newsroom * AI News & Scams * About Us * Our Company * Company Overview * Awards & Reviews * Investors * Our Efforts * Inclusion & Diversity * Integrity & Ethics * Public Policy * Join Us * Careers * Life at McAfee * Our Teams * Our Locations * Why McAfee Products All-In-One Protection NEW McAfee+ Individual Plans Complete privacy, identity and device protection for individuals. NEW McAfee+ Family Plans Complete privacy, identity and device protection for up to 6 family members. Other Products & Services Antivirus Scam Protection Virtual Private Network (VPN) Mobile Security PC Optimizer TechMaster Concierge McAfee Assist Free Tools & Downloads Web Protection Free Antivirus Trial Device Security Scan Password Generator Features Keep Me Private Online Personal Data Cleanup Online Account Cleanup VPN (Virtual Private Network) Social Privacy Manager Safeguard My Identity Identity Monitoring Credit Monitoring Security Freeze Identity Theft Coverage & Restoration Password Manager Protect My Devices Antivirus Scam Protection Web Protection Protect My Family Protection Score Parental Controls Family Plans Resources Stay Updated McAfee Blog Reports and Guides McAfee on YouTube Prevent Spam and Phishing Learn More Learn at McAfee What is Antivirus? What is a VPN? What is Identity Theft? Press & News McAfee Newsroom AI News & Scams About Us Our Company Company Overview Awards & Reviews Investors Our Efforts Inclusion & Diversity Integrity & Ethics Public Policy Join Us Careers Life at McAfee Our Teams Our Locations Why McAfee Support Help Customer Support Support Community FAQs Contact Us Activation Activate Retail Card Region Asia Pacific Australia - English New Zealand - English Singapore - English Malaysia - English Philippines - English India - English 대한민국 - 한국어 日本 - 日本語 中国 - 简体中文 香港特別行政區 - 繁體中文 台灣 - 繁體中文 Europe Česká Republika - Čeština Danmark - Dansk Suomi - Suomi France - Français Deutschland - Deutsch Ελλάδα - Ελληνικά Ireland - English Magyarország - Magyar ישראל - עברית Italia - Italiano Nederland - Nederlands Norge - Bokmål Polska - Polski Portugal - Português Россия - Русский España - Español Sverige - Svenska Suisse - Français Schweiz - Deutsch Türkiye - Türkçe العربية - العربية United Kingdom - English North America United States - English Canada - English Canada - Français South America Argentina - Español Brasil - Português Chile - Español Colombia - Español México - Español Perú - Español Sign in * Support * Help * Customer Support * Support Community * FAQs * Contact Us * Activation * Activate Retail Card * * Asia Pacific * Australia-English * New Zealand-English * Singapore-English * Malaysia-English * Philippines-English * India-English * 대한민국-한국어 * 日本-日本語 * 中国-简体中文 * 香港特別行政區-繁體中文 * 台灣-繁體中文 * Europe * Česká Republika-Čeština * Danmark-Dansk * Suomi-Suomi * France-Français * Deutschland-Deutsch * Ελλάδα-Ελληνικά * Ireland-English * Magyarország-Magyar * ישראל-עברית * Italia-Italiano * Nederland-Nederlands * * Norge-Bokmål * Polska-Polski * Portugal-Português * Россия-Русский * España-Español * Sverige-Svenska * Suisse-Français * Schweiz-Deutsch * Türkiye-Türkçe * العربية-العربية * United Kingdom-English * North America * United States-English * Canada-English * Canada-Français * South America * Argentina-Español * Brasil-Português * Chile-Español * Colombia-Español * México-Español * Perú-Español * Sign in * * Blog * Topics Internet Security Mobile Security Family Safety Privacy & Identity Protection Security News Tips & Tricks * At McAfee McAfee News Executive Perspectives McAfee Labs Life at McAfee Hackable? Podcast * English * Portuguese (BR) * Spanish * French(FR) * German * Italian * Japanese * French(CA) * Portuguese (PT) * Spanish (MX) * Dutch * * Blog * Topics Internet Security Mobile Security Family Safety Privacy & Identity Protection Security News Tips & Tricks * At McAfee McAfee News Executive Perspectives McAfee Labs Life at McAfee Hackable? Podcast * . * Portuguese (BR) Spanish French(FR) German Italian Japanese French(CA) Portuguese (PT) Spanish (MX) Dutch Blog Other Blogs McAfee Labs Android Phishing Scam Using Malware-as-a-Service on the Rise in India ANDROID PHISHING SCAM USING MALWARE-AS-A-SERVICE ON THE RISE IN INDIA McAfee Labs Mar 14, 2024 7 MIN READ Authored by ZePeng Chen and Wenfeng Yu McAfee Mobile Research Team has observed an active scam malware campaign targeting Android users in India. This malware has gone through three stages. The first one is the development stage, from March 2023 to July 2023, during which a couple of applications were created each month. The second is the expansion stage, from August 2023 to October 2023, during which dozens of applications were created each month. The third is the active stage, from September 2023 to the present, during which hundreds of applications were created each month. According to McAfee’s detection telemetry data, this malware has accumulated over 800 applications and has infected more than 3,700 Android devices. The campaign is still ongoing, and the number of infected devices will continue to rise. Malware developers create phishing pages for scenarios that are easy to deceive, such as electricity bill payments, hospital appointments, and courier package bookings. Developers use different applications to load different phishing pages, which are eventually sold to scammers. In our research, more than 100 unique phishing URLs and more than 100 unique C2 URLs are created in these malicious applications. It means that each scammer can carry out scam activities independently. Scammers use malware to attack victims. They typically contact victims via phone, text, email, or social applications to inform them that they need to reschedule services. This kind of fraud attack is a typical and effective fraud method. As a result, victims are asked to download a specific app, and submit personal information. There was a report where an Indian woman downloaded malware from a link in WhatsApp and about ₹98,000 was stolen from her. We were not able to confirm if is the same malware, but it is just one example of how these malicious applications can be distributed directly via WhatsApp. The attack scenario appears credible, many victims do not doubt the scammers’ intentions. Following the instructions provided, they download and installed the app. In the app, victims are induced to submit sensitive information such as personal phone numbers, addresses, bank card numbers, and passwords. Once this information falls into the hands of scammers, they can easily steal funds from the victim’s bank account. The malware not only steals victims’ bank account information via phishing web pages but also steals SMS messages on victims’ devices. Because of the stolen information, even if the bank account supports OTP authentication, the scammer can transfer all the funds. The malware uses legitimate platforms to deploy phishing pages to make it appear more trustworthy to evade detection. McAfee Mobile Security detects this threat as Android/SmsSpy. For more information, and to get fully protected, visit McAfee Mobile Security. Malware-as-a-Service (MaaS) We discovered that these phishing pages and malware were being sold as a service by a cyber group named ELVIA INFOTECH. A distinct difference between this malware and others is that the apps sold have a valid expiration date. When the expiration date is reached, some application links will redirect to a payment notification page. The notification is clearly to request the purchaser to pay a fee to restore the use of the malware. Figure 1. Payment notification. We also discovered that the cybercriminal group was selling malware in a Telegram group. Based on these observations, we believe that ELVIA INFOTECH is a professional cybercriminal organization engaged in the development, maintenance, and sale of malware and phishing websites. Figure 2. Telegram Group conversation. Malware Analysis This malware has been maintained and recently updated, and hundreds of malicious applications were created. They like to use the file names such as “CustomerSupport.apk”, “Mahavitaran Bill Update.apk”, “Appointment Booking.apk”, “Hospital Support.apk”, “Emergency Courier.apk” and the application names such as “Customer Support”, “Blue Dart”, “Hospital Support”,” Emergency Courier” to trick victims, below are some applications’ names and icons. Figure 3. Some applications’ names and icons Not only do they pretend to be “Customer Support”, but they also pretend to be popular courier companies like “Blue Dart” in India, but they also target utility companies like “Mahavitaran” (Power Corporation of India). Once victims click the fake icon, the application will be launched and start to attack victims. 1. Loading Phishing Pages The phishing page loads once the application is launched. It will disguise itself as a page of various legitimate services, making victims believe that they are visiting a legitimate service website. Here, victims are tricked into providing sensitive information such as name, address, phone number, bank card number, and password. However, once submitted, this information falls into the hands of scammers, allowing them to easily access and control the victim’s bank account. We found that most of this attack campaign impersonated carrier package delivery companies. Figure 4. Phishing Pages Load Once App Launches The malware developers also designed different phishing pages for different applications to deceive victims in different scenarios that exploit electricity bill payments and hospital appointments. Figure 5. Hospital appointment and Electricity Bill Phishing Pages 2. Stealing One-Time Passwords via SMS message As a core design of this malware, the application requests permissions to allow it to send and view SMS messages once it launches. Figure 6. Request SMS permissions. If victims click the “Allow” button, the malware starts a background service that secretly monitors users’ text messages and forwards them to a number which is from C2 server. Figure 7. Forward phone number from C2 server This step is crucial for the scam process, as many banks send a one-time password (OTP) to the customer’s phone for transaction verification. Using this method, the scammers can obtain these OTPs and successfully complete bank transactions. Conclusion: This malicious app and the developers behind it have emerged rapidly in India from last year to now, purposefully developing and maintaining malware, and focusing on deploying well-designed phishing websites through legitimate platforms. The group secretly promotes and sells its malware through social media platforms, making the spread of the malware more subtle and difficult to detect. This tactic resulted in an even more severe malware outbreak, posing an ongoing and serious threat to the financial security of Indian users. Malware campaigns are very persistent and using multiple different applications on different websites can trick many victims into installing these applications and providing their private and personal information, which can then be used to commit fraud. In this environment, ordinary users in India face huge cybersecurity challenges. Therefore, users need to remain vigilant and cautious when dealing with any electronic communications or application download requests that appear legitimate but may contain malware. We strongly recommend users install security software on their devices and always keep it up to date. By using McAfee Mobile Security products, users can further protect their devices and reduce the risks associated with this type of malware, providing a more secure experience. Indicators of Compromise (IOCs) SHA256 hash List: * 092efedd8e2e0c965290154b8a6e2bd5ec19206f43d50d339fa1485f8ff6ccba * 7b1f692868df9ff463599a486658bcdb862c1cf42e99ec717e289ddb608c8350 * c59214828ed563ecc1fff04efdfd2bff0d15d411639873450d8a63754ce3464c * b0df37a91b93609b7927edf4c24bfdb19eecae72362066d555278b148c59fe85 * 07ad0811a6dac7435f025e377b02b655c324b7725ab44e36a58bc68b27ce0758 * c8eb4008fa4e0c10397e0fb9debf44ca8cbadc05663f9effbeac2534d9289377 * 1df43794618ef8d8991386f66556292429926cd7f9cf9b1837a08835693feb40 * 5b3d8f85f5637b217e6c97e6b422e6b642ce24d50de4a6f3a6b08c671f1b8207 Phishing URLs: * hxxps://bijlipayupdate[.]wixsite[.]com/my-site * hxxps://appointmentservice0[.]wixsite[.]com/onlineappointment * hxxps://couriers9343[.]wixsite[.]com/courier/ * hxxps://doctorappointment34[.]wixsite[.]com/appointmentbooking * hxxps://hospitalservice402[.]wixsite[.]com/hospital-in * hxxps://adn-reg[.]com/website C2 Server URLs: * hxxps://forexroyality[.]online/complainf13/My_File[.]txt * hxxps://adn-reg[.]com/data[.]json * hxxps://icustomrcore[.]com/chand3/data[.]json * hxxps://sms[.]hrms[.]org[.]in/chugxgddhmurgiwalabhaiqwertadmin/no[.]html * hxxps://krishna[.]salaar[.]co[.]in/admindata[.]txt * hxxps://courier[.]elviainfotech[.]cloud/pages/phone[.]json INTRODUCING MCAFEE+ Identity theft protection and privacy for your digital life Download McAfee+ Now Stay Updated Follow us to stay updated on all things McAfee and on top of the latest consumer and mobile security threats. McAfee Labs Threat Research Team McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information. MORE FROM MCAFEE LABS Previous BENEATH THE SURFACE: HOW HACKERS TURN NETSUPPORT AGAINST USERS NetSupport malware variants have been a persistent threat, demonstrating adaptability and evolving infection techniques. In this technical... Nov 27, 2023 | 12 MIN READ FAKE ANDROID AND IOS APPS STEAL SMS AND CONTACTS IN SOUTH KOREA Authored by Dexter Shin Most people have smartphones these days which can be used to easily search... Nov 15, 2023 | 10 MIN READ UNMASKING ASYNCRAT NEW INFECTION CHAIN Authored by Lakshya Mathur & Vignesh Dhatchanamoorthy AsyncRAT, short for “Asynchronous Remote Access Trojan,” is a sophisticated... Nov 03, 2023 | 7 MIN READ EXPLORING WINRAR VULNERABILITY (CVE-2023-38831) Authored by Neil Tyagi On 23 August 2023, NIST disclosed a critical RCE vulnerability CVE-2023-38831. It is... Sep 19, 2023 | 8 MIN READ RISE IN DECEPTIVE PDF: THE GATEWAY TO MALICIOUS PAYLOADS Authored by Yashvi Shah and Preksha Saxena McAfee Labs has recently observed a significant surge in the... Mar 01, 2024 | 17 MIN READ GULOADER UNMASKED: DECRYPTING THE THREAT OF MALICIOUS SVG FILES Authored by: Vignesh Dhatchanamoorthy In the ever-evolving landscape of cybersecurity threats, staying ahead of malicious actors requires... Feb 28, 2024 | 5 MIN READ MOQHAO EVOLUTION: NEW VARIANTS START AUTOMATICALLY RIGHT AFTER INSTALLATION Authored by Dexter Shin MoqHao is a well-known Android malware family associated with the Roaming Mantis threat... Feb 07, 2024 | 7 MIN READ GENERATIVE AI: CROSS THE STREAM WHERE IT IS SHALLOWEST The explosive growth of Generative AI has sparked many questions and considerations not just within tech circles,... Feb 07, 2024 | 5 MIN READ FROM EMAIL TO RAT: DECIPHERING A VB SCRIPT-DRIVEN CAMPAIGN Authored by Preksha Saxena and Yashvi Shah McAfee Labs has been tracking a sophisticated VBS campaign characterized... Jan 17, 2024 | 10 MIN READ STEALTH BACKDOOR “ANDROID/XAMALICIOUS” ACTIVELY INFECTING DEVICES Authored by Fernando Ruiz McAfee Mobile Research Team identified an Android backdoor implemented with Xamarin, an open-source... Dec 22, 2023 | 14 MIN READ SHIELDING AGAINST ANDROID PHISHING IN INDIAN BANKING Authored by Neil Tyagi and Fernando Ruiz In a digitally evolving world, the convenience of banking through... Dec 20, 2023 | 8 MIN READ PDF PHISHING: BEYOND THE BAIT By Lakshya Mathur & Yashvi Shah Phishing attackers aim to deceive individuals into revealing sensitive information for... Dec 04, 2023 | 6 MIN READ BENEATH THE SURFACE: HOW HACKERS TURN NETSUPPORT AGAINST USERS NetSupport malware variants have been a persistent threat, demonstrating adaptability and evolving infection techniques. In this technical... Nov 27, 2023 | 12 MIN READ FAKE ANDROID AND IOS APPS STEAL SMS AND CONTACTS IN SOUTH KOREA Authored by Dexter Shin Most people have smartphones these days which can be used to easily search... Nov 15, 2023 | 10 MIN READ UNMASKING ASYNCRAT NEW INFECTION CHAIN Authored by Lakshya Mathur & Vignesh Dhatchanamoorthy AsyncRAT, short for “Asynchronous Remote Access Trojan,” is a sophisticated... Nov 03, 2023 | 7 MIN READ EXPLORING WINRAR VULNERABILITY (CVE-2023-38831) Authored by Neil Tyagi On 23 August 2023, NIST disclosed a critical RCE vulnerability CVE-2023-38831. It is... Sep 19, 2023 | 8 MIN READ RISE IN DECEPTIVE PDF: THE GATEWAY TO MALICIOUS PAYLOADS Authored by Yashvi Shah and Preksha Saxena McAfee Labs has recently observed a significant surge in the... Mar 01, 2024 | 17 MIN READ GULOADER UNMASKED: DECRYPTING THE THREAT OF MALICIOUS SVG FILES Authored by: Vignesh Dhatchanamoorthy In the ever-evolving landscape of cybersecurity threats, staying ahead of malicious actors requires... Feb 28, 2024 | 5 MIN READ MOQHAO EVOLUTION: NEW VARIANTS START AUTOMATICALLY RIGHT AFTER INSTALLATION Authored by Dexter Shin MoqHao is a well-known Android malware family associated with the Roaming Mantis threat... Feb 07, 2024 | 7 MIN READ GENERATIVE AI: CROSS THE STREAM WHERE IT IS SHALLOWEST The explosive growth of Generative AI has sparked many questions and considerations not just within tech circles,... Feb 07, 2024 | 5 MIN READ FROM EMAIL TO RAT: DECIPHERING A VB SCRIPT-DRIVEN CAMPAIGN Authored by Preksha Saxena and Yashvi Shah McAfee Labs has been tracking a sophisticated VBS campaign characterized... Jan 17, 2024 | 10 MIN READ STEALTH BACKDOOR “ANDROID/XAMALICIOUS” ACTIVELY INFECTING DEVICES Authored by Fernando Ruiz McAfee Mobile Research Team identified an Android backdoor implemented with Xamarin, an open-source... Dec 22, 2023 | 14 MIN READ SHIELDING AGAINST ANDROID PHISHING IN INDIAN BANKING Authored by Neil Tyagi and Fernando Ruiz In a digitally evolving world, the convenience of banking through... Dec 20, 2023 | 8 MIN READ PDF PHISHING: BEYOND THE BAIT By Lakshya Mathur & Yashvi Shah Phishing attackers aim to deceive individuals into revealing sensitive information for... Dec 04, 2023 | 6 MIN READ BENEATH THE SURFACE: HOW HACKERS TURN NETSUPPORT AGAINST USERS NetSupport malware variants have been a persistent threat, demonstrating adaptability and evolving infection techniques. In this technical... Nov 27, 2023 | 12 MIN READ FAKE ANDROID AND IOS APPS STEAL SMS AND CONTACTS IN SOUTH KOREA Authored by Dexter Shin Most people have smartphones these days which can be used to easily search... Nov 15, 2023 | 10 MIN READ UNMASKING ASYNCRAT NEW INFECTION CHAIN Authored by Lakshya Mathur & Vignesh Dhatchanamoorthy AsyncRAT, short for “Asynchronous Remote Access Trojan,” is a sophisticated... Nov 03, 2023 | 7 MIN READ EXPLORING WINRAR VULNERABILITY (CVE-2023-38831) Authored by Neil Tyagi On 23 August 2023, NIST disclosed a critical RCE vulnerability CVE-2023-38831. It is... Sep 19, 2023 | 8 MIN READ Next * 1 * 2 * 3 Back to top * * * * * -------------------------------------------------------------------------------- Corporate Headquarters 6220 America Center Drive San Jose, CA 95002 USA Products McAfee+™ Individual McAfee+™ Family McAfee® Total Protection McAfee® Antivirus McAfee® Safe Connect McAfee® PC Optimizer McAfee® TechMaster McAfee® Mobile Security Resources Antivirus Free Downloads Parental Controls Malware Firewall Blogs Activate Retail Card McAfee Labs Support Customer Service FAQs Renewals Support Community About About McAfee Careers Contact Us Newsroom Investors Legal Terms Your Privacy Choices System Requirements Sitemap -------------------------------------------------------------------------------- United States / English Copyright © 2024 McAfee, LLC Copyright © 2024 McAfee, LLC United States / English ✓ Thanks for sharing! AddToAny More…