Cyber security news for all


    Hackers Exploit WebAPK to Trick Android Users into Installing Malicious Apps

    Headline: Hackers Exploit WebAPK to Trick Android Users into Installing Malicious Apps

    Text content: Threat actors have found a way to exploit Android’s WebAPK technology, deceiving unsuspecting users into installing malicious web apps on their Android phones. These apps are specifically designed to capture sensitive personal information, putting users at risk.

    The attack typically begins with victims receiving SMS messages that urge them to update their mobile banking applications. The link provided in these messages leads to a website that utilizes WebAPK technology to install a malicious app on the victim’s device. In a recent analysis by CSIRT KNF, researchers highlighted a campaign impersonating PKO Bank Polski, a well-known multinational banking and financial services company based in Warsaw. Polish cybersecurity firm RIFFSEC first shared details of this campaign.

    WebAPK allows users to install progressive web apps (PWAs) directly to their Android device’s home screen, bypassing the need to use the Google Play Store. When a user installs a PWA using Google Chrome and WebAPK, the app is silently installed on the device. This process, facilitated by trusted providers such as Play Services or Samsung, ensures that security measures remain intact.

    Once the malicious app is installed, it masquerades as a banking app (“org.chromium.webapk.a798467883c056fed_v2”) and prompts users to enter their credentials and two-factor authentication (2FA) tokens. By doing so, the attackers steal the users’ sensitive information.

    One of the challenges in combating these attacks is the dynamic generation of different package names and checksums by WebAPK applications on each device. This makes it difficult to utilize this data as Indicators of Compromise (IoC), as highlighted by CSIRT KNF.

    To mitigate such threats, it is recommended to block websites that exploit the WebAPK mechanism to carry out phishing attacks.

    In a related development, cybersecurity firm Resecurity has uncovered an increasing trend of cybercriminals leveraging specialized device spoofing tools for Android, available on the dark web. These tools enable attackers to impersonate compromised account holders and bypass anti-fraud controls. The spoofing tools, including Enclave Service and MacFly, manipulate mobile device fingerprints and other software and network parameters analyzed by anti-fraud systems. Weak fraud controls are also exploited to conduct unauthorized transactions using banking malware such as TimpDoor and Clientor.

    Resecurity emphasizes that cybercriminals utilize these tools to access compromised accounts and impersonate legitimate customers. They exploit stolen cookie files, impersonate hyper-granular device identifiers, and exploit the unique network settings of fraud victims.

    The evolving tactics employed by hackers and their use of sophisticated techniques reinforce the need for increased user awareness and robust security measures to protect against these malicious activities.

    Recent Articles

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox

    [tdn_block_newsletter_subscribe input_placeholder="Email address" btn_text="Subscribe" tds_newsletter2-image="730" tds_newsletter2-image_bg_color="#c3ecff" tds_newsletter3-input_bar_display="" tds_newsletter4-image="731" tds_newsletter4-image_bg_color="#fffbcf" tds_newsletter4-btn_bg_color="#f3b700" tds_newsletter4-check_accent="#f3b700" tds_newsletter5-tdicon="tdc-font-fa tdc-font-fa-envelope-o" tds_newsletter5-btn_bg_color="#000000" tds_newsletter5-btn_bg_color_hover="#4db2ec" tds_newsletter5-check_accent="#000000" tds_newsletter6-input_bar_display="row" tds_newsletter6-btn_bg_color="#da1414" tds_newsletter6-check_accent="#da1414" tds_newsletter7-image="732" tds_newsletter7-btn_bg_color="#1c69ad" tds_newsletter7-check_accent="#1c69ad" tds_newsletter7-f_title_font_size="20" tds_newsletter7-f_title_font_line_height="28px" tds_newsletter8-input_bar_display="row" tds_newsletter8-btn_bg_color="#00649e" tds_newsletter8-btn_bg_color_hover="#21709e" tds_newsletter8-check_accent="#00649e" embedded_form_code="YWN0aW9uJTNEJTIybGlzdC1tYW5hZ2UuY29tJTJGc3Vic2NyaWJlJTIy" tds_newsletter="tds_newsletter1" tds_newsletter3-all_border_width="2" tds_newsletter3-all_border_color="#e6e6e6" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjAiLCJib3JkZXItY29sb3IiOiIjZTZlNmU2IiwiZGlzcGxheSI6IiJ9fQ==" tds_newsletter1-btn_bg_color="#0d42a2" tds_newsletter1-f_btn_font_family="406" tds_newsletter1-f_btn_font_transform="uppercase" tds_newsletter1-f_btn_font_weight="800" tds_newsletter1-f_btn_font_spacing="1" tds_newsletter1-f_input_font_line_height="eyJhbGwiOiIzIiwicG9ydHJhaXQiOiIyLjYiLCJsYW5kc2NhcGUiOiIyLjgifQ==" tds_newsletter1-f_input_font_family="406" tds_newsletter1-f_input_font_size="eyJhbGwiOiIxMyIsImxhbmRzY2FwZSI6IjEyIiwicG9ydHJhaXQiOiIxMSIsInBob25lIjoiMTMifQ==" tds_newsletter1-input_bg_color="#fcfcfc" tds_newsletter1-input_border_size="0" tds_newsletter1-f_btn_font_size="eyJsYW5kc2NhcGUiOiIxMiIsInBvcnRyYWl0IjoiMTEiLCJhbGwiOiIxMyJ9" content_align_horizontal="content-horiz-center"]