MyCERT Advisories


MyCERT Advisories, Alerts and Summaries for the year 2018

MA-695.012018: MyCERT Alert – Fake Bank Negara Malicious APK – New Variant

Date first published: 15/1/2018



1.0 Introduction
MyCERT and NC4 had received several reports from Financial Institutions regarding their customers’ smartphones had been infected with malware through a scam campaign recently. National Cyber Coordination and Command Centre (NC4) has released an alert regarding this matter. Users may refer to the URL below for details:


2.0 Impact
 The victim suffered money loss through the non-consented transaction.
 Disclosure of personal information to scammers or unknown parties may increase similar scamming campaigns in future.


3.0 Modus Operandi

In summary, the modus operandi for this scam is as follows:



4.0 Preliminary Analysis

Sample:
BinarySha-256 HashSize
MaintainV3.apk6208b01e4c78ba3bae9685791ef1a663f1ea158eb3f1e2474e5f35377244283a7.2 MB

Server:
IP AddressPortLocationRemark
144.217.88.3880Canada (OVH)Cloud Service, host malicious file, C2 server


Scammer detail:
Phone Number Used
+6011- 14149637



When victim browse to the given link using mobile browser, it will display a web page with Bank Negara logo. The victim will be instructed to click on the logo to download an app and directed to install it on their device.





JavaScript is used on the website to ensure only mobile browser can see the content. If the victim is using the browser on their PC, they will be redirected to some page at Baidu website.




5.0 Behaviour Analysis

1. Scammer guide victim to enable “Unknown Sources” in Settings -> Security to enable application installation from unverified Source.






2. Victim was directed to a link given thru by phone or messenger and asked click on a BNM logo.






3. A file will be downloaded into the victim phone. The victim will be guided to install the APK on their device.






The app will request to become default SMS app.



4. Once Installed and open, it will display the main page of this mobile application.





5. The app then displays a page for the user to key-in all the required credential information. The scammer will guide victim to fill up legit Malaysian online banking credentials.




6. When victim clicks “Confirm” button, the application will send those data to the C2 server.

   
7. The application also will create a contact number “中 “with number “123123” inside the victim’s contact list.

 


8. The malicious application will check for internet connection by sending request to “www.baidu.com”
 





9. Once the application got access to the internet, it will send information to C2 server on the smartphone details.
 




The information requested is as per the screenshot below:







10. From here, all the information is then stored on the server through REST API in JSON format.
 




11. The app then starts monitoring the SMS inbox and continuously communicated with the C2 server. When an SMS is detected, the app then forwards the SMS to the C2 server.
 







12. The app continuously monitors the SMS inbox (nonstop) and communicate with the C2 server in the background.

13. Even if victim reboots their phone, the app will autorun because the app is running as service and continuously monitor the SMS.

14. MyCERT has identified the IP address and URLs that have been used to spread the malicious installer and act as C2 server, and also escalated to respected parties for takedown to prevent from further affecting Malaysian citizens.


6.0 Recommendations
4.1 If you received such scam phone call, which impersonates local law enforcement agency, you can immediately:
1. Immediately end any suspicious call and never respond to any instruction
2. Refer directly to the financial institution mentioned during the call and check with them.
3. Contact the respective law enforcement agency for verification.
4. Report the incident to cyber999@cybersecurity.my for MyCERT incident response.
5. Users may forward to Cyber999 the malicious application for further analysis.


6.1 General best practice for smartphone users:
1. Verify an app's permission before installing it i.e. online banking app shouldn’t require access to the camera, microphone and SMS permission.
2. Do not click on adware or suspicious URL sent through SMS/messaging services. A malicious program could be attached to collect user's information.
3. Verify given URLs with the official financial institution or law enforcement agency website. On mobile, site URL may appear differently from desktop browser, make sure to verify it too.
4. Always run a reputable anti-virus on your smartphone/mobile devices, and keep it up to date regularly.
5. Don't use public Wi-Fi networks for bank transactions and turn off Bluetooth connection when not in use. These can be open windows for eavesdroppers intercepting the transaction or installing spyware and other malware on user's smartphone/tablet.
6. Update the operating system and applications on smartphone/tablet, including the browser, in order to avoid any malicious exploits of security holes in out-dated versions.
7. Do not root or otherwise 'Jailbreak' your phone. This gives administrator privilege to access the device filesystem and malicious app could take advantage. 
8. Avoid side loading (installing from non-official sources) when you can. If you do install Android software from other sources than the official app store, be sure that it is coming from a reputable source.
9. Please ensure to turn off the “Unknown Source” option in the Security Settings page.

Generally, MyCERT advises the users of this software to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.

For further enquiries, please contact MyCERT through the following channels:

Phone: 1-300-88-2999 (monitored during business hours)
Fax: +603 89453442 
Mobile: +60 19 2665850 (24x7 call incident reporting)
SMS: CYBER999 REPORT EMAIL COMPLAINT to 15888
Business Hours: Mon - Fri 09:00 -18:00 MYT
Cyber999 Mobile Apps: IOS Users or Android Users



7.0    References