1.0 Introduction
MyCERT received a report concerning several fraudulent websites that impersonate Petronas Malaysia for suspicious purposes. We identified cybercriminals exploiting a malicious android application (APK) in a campaign targeting Petronas customers.

Victims will be directed to a fake website that impersonates the Petronas SYNTIUM brand that offers an All-Inclusive Car Service Package and lures victims into downloading a malicious APK file, to be used for booking the All-Inclusive Car Service package.  

2.0 Description
Once the malicious APK is downloaded into the victim’s phone, the victim will key in their personal information such as name, telephone number, and shipping address into the malicious application for booking the All-Inclusive Car Service Package. The malicious APK file will collect this information, input from the victim, and send it to a C&C server accessible by the cyber criminals. After that, the victim will be prompted to make a payment, either via online banking or credit card modes within the malicious application. If victims choose, online banking, they will be prompted to a fake online banking website and victims will insert their banking credentials (believing it is a legitimate online baking website) in order to proceed to make payment. The banking credentials will be collected by the malicious APK and will be sent to a C&C server. The malicious APK file also has the capability to capture every incoming SMS including SMS sent by legitimate online banking websites cybercriminals containing authorisation/TAC codes, which can be used by cyber criminals for unauthorised online banking transactions. 

3.0 Impact
Financial loss and disclosure of banking credentials and other Personal Identifiable Information (PII).

4.0 Affected System and Devices
Android.

5.0 Indicator of Compromised

Table 1: List of Indicators of Compromise (IOC) for MyPetronas Campaign

Indicators Indicator type Description 
9b839b76e2fadec2f461b7b440489601MD5Hash of the APK sample 
c6fa3333bccfe51ef149b8536eeaa988e1ca6343SHA-1
954cf238d370b6420908956997f60abfc6153053bc6cc4c458c25320568fc729SHA-256 
myworkshop.apkFile nameFile name of the APK file
hxxps://pt-gift[.]store
hxxps://petronas-gift[.]store
hxxps://myworkshop[.]store
URLLanding page URL
hxxps://lapks.online/skyblue_888a/api/api.php?post_order
hxxps://gpost996.online/post.php
hxxps://sgbx.online?pass=app168&cmd=sms&sid=%1$s&sms=%2$s
URLC&C URL

Figure 1: Landing Page That Hosts the Malicious APK file via the “Booking Here” Button

6.0 Recommendations
The main motive of the malicious APK is possibly to steal banking credentials belonging to victims which could be used for malicious purposes. MyCERT would highly recommend the followings:

  • DO NOT SIMPLY DOWNLOAD ANY APPLICATIONS SENT BY SOMEONE CLAIMING TO BE OFFERING SERVICES OR SELLING GOODS.
  • Verify application permission and the application author or publisher before installing it.
  • Avoid side loading (installing from non-official sources) when you can. If you do need to install Android software from a source other than the trusted marketplace, be sure that it is coming from a reputable source.
  • Do not click on adware or suspicious URL sent through SMS/messaging services.
  • A malicious program could be attached to collect users' information.
  • Always run a reputable anti-virus on your smartphone/mobile devices and keep it up to date regularly.
  • Update the operating system and applications on smartphones/tablets, including the browser, in order to avoid any malicious exploits of security holes in out-dates versions.
  • Do not root or 'Jailbreak' your phone.
  • Contact relevant authorities such as Cyber999 for any inquiries and assistance needed related to this threat.

Generally, MyCERT advises the users of these devices to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.

For further enquiries, please contact MyCERT through the following channels:

E-mail: cyber999[at]cybersecurity.my 
Phone: 1-300-88-2999 (monitored during business hours)  
Mobile: +60 19 2665850 (24x7 call incident reporting) 
Business Hours: Mon - Fri 09:00 -18:00 MYT 
Web: https://www.mycert.org.my 
Twitter: https://twitter.com/mycert 
Facebook: https://www.facebook.com/mycert.org.my

7.0    References

  1. MA-834.052022: MyCERT Alert - SMSSpy campaign to steal Malaysian banking user credential
    https://www.mycert.org.my/portal/advisory?id=MA-834.052022
  2. MA-790.072020: MyCERT Alert - SMSSpy using Malaysian Law Enforcement as theme
    https://www.mycert.org.my/portal/advisory?id=MA-790.072020
  3. MA-690.122017: MyCERT Alert - Fake PDRM Malicious APK
    https://www.mycert.org.my/portal/advisory?id=MA-690.122017
  4. MA-695.012018: MyCERT Alert - Fake Bank Negara Malicious APK - New Variant
    https://www.mycert.org.my/portal/advisory?id=MA-695.012018
  5. MA-694.012018: MyCERT Alert - Fake Bank Negara Malicious APK
    https://www.mycert.org.my/portal/advisory?id=MA-694.012018
  6. https://www.virustotal.com/gui/file/954cf238d370b6420908956997f60abfc6153053bc6cc4c458c25320568fc729
  7. https://notes.netbytesec.com/2022/09/scam-android-app-steals-bank.html