Fjord Phantom Malware Process and Execution Analysis in Mobile Banking Application.pdf
Fjord Phantom Malware Process and Execution Analysis in Mobile Banking Application.pdf
Drajad Wiryawan
School of Information System
Bina Nusantara University
Jakarta, Indonesia
[email protected]
Abstract—Technological development and acceleration Along with very rapid technological developments,
cannot be avoided in the digital era. Technology is used in conventional banking services are starting to be abandoned,
various transactions to support existing productivity. But and customers or users are switching to digital services. By
behind it all, some vulnerabilities and risks always arise without using digital services, transactions can be carried out
users realizing it. One of them is FjordPhantom. Fjordphantom
anywhere and at any time according to the needs of users or
is the name of malware with different characteristics from most
malware. This malware is a combination of malware attacks on customers, thereby increasing the economy. However, this
various banking service applications. The process carried out by can also be a threat and problem because banking services
the creator of this malware is to embed the software into the have been digitized, opening up opportunities for
virtualization server where the official banking service cybercriminals to commit crimes. Moreover, the techniques
application is located. The impact is extraordinary and causes used to commit crimes are very diverse, ranging from fraud
the users or customers served to lose quite a lot of material. This phishing to malware to commit the crime. Therefore, using
research was conducted to provide an overview of this malware digital banking services makes the transaction process more
in the real world. The author tries to study this by analyzing accessible and increases the time risk[4].
various information obtained from journals and papers related
According to Kaspersky Security Network, during Q2
to the process and execution carried out by the malware on
existing banking service applications. The research method used 2023, 5,704,599 Android malware were blocked. Of the total
is qualitative, with a research model, namely, a systematic malware that has been blocked, 30.8% is unwanted software.
literature review. Based on the analysis results and conclusions The malware also attacks Android users mobile banking, as
obtained, 22 papers discussed this malware. it was discovered in an online store embedded with
In contrast, until now, most existing banking service JavaScript code to steal details from users' bank cards.
technology application users have still not been aware of this Android devices have developed over time, increasing
malware. The author's hope in writing about the process and vulnerabilities in Android applications. It can happen because
execution carried out by this malware is to provide an accurate it is open source, and this statement is supported by the Quick
picture that behind the technology used and used as a reference
Heal Quarterly Threat Report Q1, which states that Android
by its users, it is necessary always to be aware of it and make
important notes in its use. And in the future, other malware that malware was developed 304 times between 2011 and 2014.
is more sophisticated in technology may emerge. So, it can be concluded that Android is more vulnerable to
Keywords— Malware, FjordPhantom, Mobile Banking, malware attacks.
Virtual Machine, Android OS
II. LITERATURE REVIEW
I. INTRODUCTION
A. Virtualization
In today's highly developed digital era, using digital
Virtualization in computer technology creates a new
devices in everyday life is inevitable. Author often encounter virtual environment that is not connected to a device's
digital devices such as computers, laptops, smartphones, and primary environment[5]. The virtualization technique also
tablets, both in banking and non-banking, so their use is
means separating the computer environment from its physical
beneficial and helps us in our activities. However, technology
infrastructure and then dividing it into several virtual
is also often used to carry out criminal activities in cyberspace,
machines. It can run several tasks simultaneously on one
usually called cybercrime[1].
device[6]. Virtualization can be a double-edged sword
There are many types of cybercrime, one of which is because it can hide malware and, conversely, detect
often called hacking, where this activity infiltrates or breaks dangerous things or malware[7].
into digital devices used by users so that all data and networks
In terms of malware detection, several tools can be used,
owned can be publicly revealed [2]. It is due to the existence
one of which is Red Pill, but there is no 100% guarantee that
of tools in the form of software designed to damage the
this VM detection method will successfully detect malware
computer system used, which is called malware [3]. Although
[8]. The process of detecting malware attacks using a VM
these two things are different, malware is often used in the will be more difficult because there is no direct access to the
hacking process to make it easier to steal data or commit other physical memory of the VM[9], [10], [11].
crimes.