Blog Zscaler

Ricevi gli ultimi aggiornamenti dal blog di Zscaler nella tua casella di posta

Iscriviti
Ricerca sulla sicurezza

How a Phishing Campaign Targeting Indian Banking Users is Distributing an SMS Stealer

MITESH WANI, SHIVANG DESAI, KAIVALYA KHURSALE
ottobre 29, 2021 - 5 Minuti di lettura

Scammers are always coming up with new, more sophisticated social engineering techniques to collect user credentials for financial benefit. However, when it comes to banking websites, capturing login credentials via a phishing campaign often isn’t enough for cybercriminals.

Due to the implementation of two-factor authentication by most banking sites, which includes receiving a one-time password on a registered mobile number, transactions have become more secure. However, in parallel, attackers have also found ways to bypass this two-factor authentication implementation by stealing the user’s phone messages.

Zscaler’s ThreatLabz researchers recently discovered a sophisticated phishing campaign targeting customers of top Indian banks like State Bank of India, Punjab National Bank, Union Bank, HDFC, and Canara. The well-designed phishing pages are difficult to distinguish from legitimate sites and aim to collect all the customer’s banking credentials including account holder name, registered mobile number, account number/card number, ATM pin, IFSC code, and expiry date. The end goal of capturing this information is to install a malicious SMS stealer that monitors the messages on the infected mobile/tablet, and communicates with a C2 server whenever the customer receives an SMS.

Analysis of a phishing campaign:

The homepage depicts a customer support form for submitting queries. The user is asked to enter their name, phone number, and reason for the failed transaction as shown in the figure below.

 

 Image

 

Fig 1. Phishing Home Page

 

In the next step, the user is asked to enter an account number, which can be used to log in to an online banking account.

 

 Image

 

Fig 2. Refund Mode Confirmation

 

The next step prompts the user to enter an account number (probably to confirm the correct account number) and IFSC code field and to check the bank account branch.

 

  Image

 

Fig 3.  Prompt for Account No. & IFSC code

After that, it is required to enter the CIF No. and the card expiry date. The customer identification file, or CIF number in general, is an electronic, 11 digit number that contains all the personal information of the customers.

Image

 

Fig 4. Prompt for CIF number and Expiry Date

 

After that, the phishing page asks users to enter their ATM PIN as shown in the screenshot below.

 

   Image

 

Fig 5. Prompt for ATM Pin

In the last step, an app gets downloaded on the user’s device and a message is displayed for the user to wait until the download starts.

 

  Image

 

Fig 6. Malicious APK download 

Here are a few more campaigns with the same phishing techniques targeting other Indian bank users.

 

    Image

 

Fig 7. A phishing campaign targeting Punjab National Bank users.

 

   Image

 

Fig 8. A phishing campaign targeting BHIM UPI users

 

Analysis of Android SMS Stealer:

    The downloaded app is a basic SMS stealer which portrays itself as a banking support app using the name SBI Quick Support and has the official logo of the targeted bank. 

  Image

 

Fig 9. Malware portraying itself as SBI Quick Support App

 

Once installed, the app asks for permission to send/view messages from the phone as shown in the figure below.

 

  ImageImage

 

Fig 10. Screenshot and code snippet for SMS permission

The malware also achieves persistence in the infected device by setting RECEIVE_BOOT_COMPLETED permission so that it can start itself after the device reboots.

 

 Image

 

Fig 11. Code snippet for Autostart configuration

 

If any of the permissions get denied, the malware displays an alert dialog to manipulate the user into granting permission.

 

   Image

 

 Fig 12. Code snippet for displaying alert dialog

 

Lastly after all the permissions are granted, the malware displays a fake form for submitting a complaint number. Meanwhile, in the background, it monitors all the incoming messages.

 

ImageImage

 

Fig 13. Screenshot and code snippet for displaying fake form

 

As soon as any message is received on the victim’s phone, the malware performs exfiltration of the received message with some other device information to the C2 server stored statically in the code via a POST request.

 

 ImageImage

 

Fig 14. C2 URL stored in a variable


 

Image

 

Fig 15. Cloud Sandbox report for SMS Stealer

 

Conclusion: 

 

Android powers hundreds of millions of mobile devices around the world. It's the largest installed base of any mobile platform and growing fast, and attackers are taking advantage of this by targeting Android users.

Due to Android flexibility and ease of use, there has been an increase in the use of mobile banking applications, and users are accidentally installing malicious apps such as the stealer mentioned above. Some best practices to protect Android users are:

  • Only install apps from official stores, such as Google Play.
  • Never click on unknown links received through ads, SMS messages, emails, or from any other messaging applications.
  • Always keep the "Unknown Sources" option disabled on your Android device. This option will prevent applications from installing from unknown sources.
     

Package Names:

 

com.sbi.complaintregister

sbi_complaint.apk

com.example.complaintregisters

PNB%20Support.apk

com.example.myapplication

union.apk

com.complaintregister.bhim

UPI_Complaint.apk

com.pnb.complaintregister

pnb_complaint.apk

com.example.myapplication

HDFC_Complaint.apk

com.example.complaintregister

canara.apk


 

IOCs:

 

Domains:

complaintregisterqueries[.]com

onlineregisterquery[.]com

customersupportspoint[.]com

complaintsqueryregister[.]com

complaintregisters[.]com

furnitureshops[.]org

 

MD5 Hashes:

 

50ba955ff89e6d4ea873ea35459cd696

a23bc4ac3df7e2bf60e584fdb31d6071

ed7d6c10b38b3546361ef12f6a0fd218

d56d89a899617a8deb9a176a1eb84bdb

4a2cea20ee062f0cb4c8c509371f05e8

7170c67c15c9fc21b34a43168818c00a

3baccf75f4ad66a7224f1d36387e8df1

3ac0ea94f849a51aa50d0432767a753f

8ba928045fe485558bb9fe96cdd2e7ec

99f8375f0c2b99611472da12968660ba

ce9fada00b581babd4b439665797a280

B741ea005d5b720b4f69d1589e1059db

 

MITRE ATT&CK Techniques:


 

Actions

Tag ID

Access Stored Application Data

T1409

Capture SMS Messages

T1412

System Network Connections Discovery

T1421

System Information Discovery

T1426

Application Layer Protocol

T1071

Carrier Billing Fraud

T1448
 

form submtited
Grazie per aver letto

Questo post è stato utile?

Ricevi gli ultimi aggiornamenti dal blog di Zscaler nella tua casella di posta

Inviando il modulo, si accetta la nostra Informativa sulla privacy.