Fake Mobile Apps to steal your Credentials and Private Keys

Home/Compromised, Exploitation, Internet Security, IOC's, Malware, Mobile Security, Tips/Fake Mobile Apps to steal your Credentials and Private Keys

Fake Mobile Apps to steal your Credentials and Private Keys

Recent observance by researchers in the Google Play Store showed that numbers of applications are malicious to the user. The malicious activities performed includes the stealing of credentials, private information such as private keys of the user’s crypto currency wallets.

These applications are named as Facestealer Spywares, which steals Facebook credentials from users through fake applications from the Google Play Store.

The stolen information, later used to compromise Facebook accounts for activities such as phishing scams, ad bots and more.

This Facestealer changes its code frequently creating more variants. From the day of its discovery, it has been constantly up against Google Play Store.

Of the 200 fake applications, 42 are VPN Services, 20 camera applications, 13 Photo-editing applications. Along with harvesting credentials, the apps are also designed to steal Facebook cookies and personally identifiable information associated with a victim’s account.

Also, Trend Micro disclosed that it uncovered over 40 rogue cryptocurrency miner apps that target users interested in virtual coins with malware designed to trick users into watching ads and paying for subscription services.

It also disclosed information about a few malicious applications that were involved and studied during their research process.

Their investigation further revealed that most of these fraudulent crypto mining applications are developed using the Kodular, a free online suite used for mobile application development.

SUGGESTIONS

These Fake apps are impersonating as genuine simple applications such as, Virtual Private Networks, Cameras, Picture Editing applications, and even as Fitness applications, to tempt the users in installing the applications in their devices.

They could be avoided by checking their reviews, especially the negative ones, to see if there are any unusual concerns or experiences from actual users who have downloaded the apps.

Users should steer clear of downloading apps from third-party sources, since these are where many malicious actors host their fraudulent apps.

INDICATORS OF COMPROMISE

FACESTEALER

SHA-256Package nameDetection nameDownload count before being taken down
7ea4757b71680797cbce66a8ec922484fc25f87814cc4f811e70ceb723bfd0fccom.olfitness.androidAndroidOS_FaceStealer.HRXH10,000+
b7fe6ec868fedaf37791cf7f1fc1656b4df7cd511b634850b890b333a9b81b9dcom.editor.xinphotoAndroidOS_FaceStealer.HRXF100,000+
40580a84b5c1b0526973f12d84e46018ea4889978a19fcdcde947de5b2033cffcom.sensitivity.swarmphotoAndroidOS_FaceStealer.HRXE10,000+
6ccd0c0302cda02566301ae51f8da4935c02664169ad0ead4ee07fa6b2f99112com.meta.adsformeta3AndroidOS_FaceStealer.HRXG100+
4464b2de7b877c9ff0e4c904e9256b302c9bd74abc5c8dacb6e4469498c64691com.photo.panoramacameraAndroidOS_FaceStealer.HRXF50,000+ 
3325488a8df69a92be92eb11bf01ab4c9b612c5307d615e72c07a4d859675e3fcom.photo.moveAndroidOS_FaceStealer.HRXF10,000+

CRYPTO-MINERS

SHA-256Package nameDetection name
3d3761c2155f7cabee8533689f473e59d49515323e12e9242553a0bd5e7cffa9

7c76bff97048773d4cda8faacaa9c2248e594942cc492ffbd393ed8553d27e43

c56615acac1a0df1830730fe791bb6f068670d27017f708061119cb3a49d6ff5  
app.cryptomining.workAndroidOS_FakeMinerStealer
By | 2022-05-18T17:34:17+05:30 May 18th, 2022|Compromised, Exploitation, Internet Security, IOC's, Malware, Mobile Security, Tips|

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!