SlideShare a Scribd company logo
TLP:WHITE
From FakeSpy to Guerilla
Understanding Android Malware Crime Gangs
Fyodor Yarochkin (with help of Paul Pajeres, Vladimir Kropotov, Ecular Xu,
Zhengyu Dong)
Trend Micro Research
Copyright 2021 Trend Micro Inc.
2 TLP:WHITE
Introduction
Copyright 2021 Trend Micro Inc.
3 TLP:WHITE
Why Mobile phones are targets?
• Mobile often phones ~= ATM cards with
Antennas
• Telecom carriers ~= Banking Institutions
• Less regulated, more connected, easier to break,
compromise and remotely control
Copyright 2021 Trend Micro Inc.
4 TLP:WHITE
Reasons for Android Phones being targetd
1. Money theft
2. Cyber espionage
3. Data breaches
4. Ransomware (targeted)
5. Crypto currencies
Copyright 2019 Trend Micro Inc.
5 TLP:WHITE
Geographical specifics
• Many online IDs are bound to a phone in
China
• Mobile Phones allow balance transfers in a
number of countries including china, india
• Verified phone numbers in some countries
allow caller impersonation
Copyright 2021 Trend Micro Inc.
6 TLP:WHITE
Criminals interest in android platforms?
• Money (banking)
• Virtual currencies
• Access to other apps and accounts in bulk
• Access to phone numbers
Copyright 2021 Trend Micro Inc.
7 TLP:WHITE
Numbers are valuable commodity
Copyright 2021 Trend Micro Inc.
8 TLP:WHITE
Lets take a look at some examples
• Fakespy
• Anubis
• Guerilla
Copyright 2021 Trend Micro Inc.
9 TLP:WHITE
A good illustration what hackers want from a
phone
• Mail
• Storage
• Finance
• Online accounts
• Crypto currencies
Copyright 2021 Trend Micro Inc.
10 TLP:WHITE
Fakespy
Copyright 2021 Trend Micro Inc.
11 TLP:WHITE
How It Works
SMS with malicious link
Poses as courier service,
Chrome update, others.
Prompt to install
malicious iOS profile
to configure Wifi, email
accounts, etc
Prompts to install
malicious Android
app
Display Apple phishing
or illegal Casino site
Monitor device activity
like SMS, device info,
router, mobile transactions
Connect to SNS account
Decrypt content and reveal
real C2 server
Send and receive information
Spread SMS to contacts
Copyright 2021 Trend Micro Inc.
12 TLP:WHITE
Lifecycle of Fakespy Apps
Oct 2017
Dec 2017 Jun 2018
Korean banks
(NH Capital,
KB Kookmin,
Nonghyup Bank)
Apr 2019
Oct
2019
2,000+ fake apps
up to Nov
Label: 日本郵便
Aug
2019
5,400+
fake apps
up to Nov
Label: DHL
Paket 4 fake apps
Label: Die Post
Jul
2019
1,400+ fake apps
up to Nov
Label: 智能宅急
便
Started Feb 2016
around 800+ fake
apps until Aug 2019
1200+ fake apps
in Sep 2019 to Nov
Label: CJ 대한통운
Sep
2019
20,000+ fake apps
since 2015
Label: Chrome
600+ fake apps
since 2017
Label: Facebook
21,600+ fake apps
since 2017
Label: 佐川急便
Xloader started Jun 2018
Fakespy started Dec 2017
70+ fake apps
Oct & Nov 2019
Label: ヤマト運輸
50+ fake apps
Mar to Sep 2019
Label: SEX kr porn
2 fake app MyDocomo
800+ fake apps
Mar to Oct 2019
Label: Anshin Scan
Copyright 2019 Trend Micro Inc.
13 TLP:WHITE
Use of social networks as covert channel
Copyright 2021 Trend Micro Inc.
14 TLP:WHITE
Fakespy
• Fakespy does not target banks but
• collects contact information, intercepts SMS
• and propagates via SMS. Common lures are
• Japan Post, Sagawa Express and Chrome
Copyright 2021 Trend Micro Inc.
15 TLP:WHITE
Fakespy derrivatives
• FakeOps: targets europe (appeared during Covid)
• Xloader: banks in Japan
Copyright 2021 Trend Micro Inc.
16 TLP:WHITE
Fakespy vs Xloader
0
50,000
100,000
150,000
200,000
250,000
300,000
350,000
Jan-19
Feb-19
Mar-19
Apr-19
May-19
Jun-19
Jul-19
Aug-19
Sep-19
Oct-19
Nov-19
Dec-19
Jan-20
Feb-20
Mar-20
Apr-20
May-20
Jun-20
Jul-20
Aug-20
FakeSpy Xloader
Copyright 2021 Trend Micro Inc.
17 TLP:WHITE
Victims and Infrastrcture
• Asia: Korea, Japan, Singapore
• Some countries in Europe
• Infrastructure: geographically diverse
Copyright 2021 Trend Micro Inc.
18 TLP:WHITE
Anubis
Copyright 2019 Trend Micro Inc.
19 TLP:WHITE
What is Anubis?!
Copyright 2019 Trend Micro Inc.
20 TLP:WHITE
Anubis backend
Copyright 2019 Trend Micro Inc.
21 TLP:WHITE
Anubis communications
Copyright 2019 Trend Micro Inc.
22 TLP:WHITE
Objective of Anubis actions: $$$
MONEY!
Copyright 2019 Trend Micro Inc.
23 TLP:WHITE
Copyright 2021 Trend Micro Inc.
24 TLP:WHITE
Guerilla
Copyright 2019 Trend Micro Inc.
25 TLP:WHITE
Copyright 2019 Trend Micro Inc.
26 TLP:WHITE
Copyright 2019 Trend Micro Inc.
27 TLP:WHITE
Guerilla app testing lifecycle
Copyright 2019 Trend Micro Inc.
28 TLP:WHITE
Debugging statements in some modules
Copyright 2019 Trend Micro Inc.
29 TLP:WHITE
Lots of other functionality
Copyright 2019 Trend Micro Inc.
30 TLP:WHITE
functionality (2)
paramBundle = c.b("{n "birthday": {n "year":
1966,n "month": 6,n "day": 25n },n
"gender": "female",n "username":
"biukabiuka88" + new Random().nextInt(1000) + "",n
"passwd": "d0b22405db",n "key":
Copyright 2019 Trend Micro Inc.
31 TLP:WHITE
Many victims, globally
Copyright 2019 Trend Micro Inc.
32 TLP:WHITE
ConclusionJ
Trust your phone?
Verify your phone?
Protect phone?
Copyright 2019 Trend Micro Inc.
33 TLP:WHITE
Protect your phone :p
my phone – my
bastion J
Questions? ;-)
Iphone J
Copyright 2021 Trend Micro Inc.
34 TLP:WHITE
Thank You!
QUESTIONS => FYODOR_YAROCHKIN@TRENDMICRO.COM

More Related Content

What's hot (18)

PDF
10 of the Top Data Breaches of the Decade
studentinternetdeals33
 
PPTX
What is sim swipe fraud
CyberSangam
 
PPTX
Mobile Payments Overview
Toveri
 
PDF
Payment Week - Andrew Barnes, Managing Director___Gemalto
Andrew Barnes
 
PDF
Keep your office secure
Konica Minolta
 
PDF
National Mobile Device Registration
Commonwealth Telecommunications Organisation
 
PPT
Driving Payment Innovation - Know Your Enemy
First Atlantic Commerce
 
PDF
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
ArielMcCurdy
 
PPTX
Issues and ethics in finance (fin 657) - How hackers steal $81 million in Ban...
Hafizah Jupri
 
PDF
Kin (Bright Policy)
Daniel Rosen
 
DOCX
Online payment gateway service providers testware informatics
yathishbesant
 
PDF
Cybercriminality
Chantal Abam
 
PDF
Ready.estate pitchdeck
Chris Hamby
 
PPTX
Law enforcement agencies grappling with spike in multi-million-dollar cyber s...
Bigger Price
 
KEY
Cybercrime and Business Process Hacking
Richard Stiennon
 
PDF
ISTR Internet Security Threat Report 2019
- Mark - Fullbright
 
PDF
The Cost Of Hacking
bluecoatss
 
PPTX
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
Jonathan Care
 
10 of the Top Data Breaches of the Decade
studentinternetdeals33
 
What is sim swipe fraud
CyberSangam
 
Mobile Payments Overview
Toveri
 
Payment Week - Andrew Barnes, Managing Director___Gemalto
Andrew Barnes
 
Keep your office secure
Konica Minolta
 
National Mobile Device Registration
Commonwealth Telecommunications Organisation
 
Driving Payment Innovation - Know Your Enemy
First Atlantic Commerce
 
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
ArielMcCurdy
 
Issues and ethics in finance (fin 657) - How hackers steal $81 million in Ban...
Hafizah Jupri
 
Kin (Bright Policy)
Daniel Rosen
 
Online payment gateway service providers testware informatics
yathishbesant
 
Cybercriminality
Chantal Abam
 
Ready.estate pitchdeck
Chris Hamby
 
Law enforcement agencies grappling with spike in multi-million-dollar cyber s...
Bigger Price
 
Cybercrime and Business Process Hacking
Richard Stiennon
 
ISTR Internet Security Threat Report 2019
- Mark - Fullbright
 
The Cost Of Hacking
bluecoatss
 
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
Jonathan Care
 

Similar to 【HITCON FreeTalk 2021 - From fakespy to Guerilla: Understanding Android malware crime gangs】 (20)

PDF
When developer's api simplify user mode rootkits developing.
Yury Chemerkin
 
PDF
2012 nq mobile_security_report
Isnur Rochmad
 
PDF
Rpt repeating-history
Anatoliy Tkachev
 
PPT
Mobile code mining for discovery and exploits nullcongoa2013
Blueinfy Solutions
 
PPT
3 Hkcert Trend
SC Leung
 
PDF
RSA - Behind the scenes of a fake token mobile app operation
juan_h
 
PDF
RSA Monthly Online Fraud Report -- February 2014
EMC
 
PDF
CNIT 128 5: Mobile malware
Sam Bowne
 
PDF
Malware on Smartphones and Tablets - The Inconvenient Truth
AGILLY
 
PDF
The Current State of Cybercrime 2014
EMC
 
PDF
Avoiding Bad URL's In the Mobile Web
Alliance Data card services - Know More Sell More
 
PDF
Mobile Malware
Martin Holovský
 
PPTX
I haz you and pwn your maal
Harsimran Walia
 
PPTX
h@kin9 & vulnerability assessment in android
jaswanth chodavarapu
 
PDF
Android malware overview, status and dilemmas
Tech and Law Center
 
PPTX
Methods of Cybersecurity Attacks
ZyrellLalaguna
 
PDF
Les 10 risques liés aux applications mobiles
Bee_Ware
 
PDF
Operation Buhtrap - AVAR 2015
ESET
 
When developer's api simplify user mode rootkits developing.
Yury Chemerkin
 
2012 nq mobile_security_report
Isnur Rochmad
 
Rpt repeating-history
Anatoliy Tkachev
 
Mobile code mining for discovery and exploits nullcongoa2013
Blueinfy Solutions
 
3 Hkcert Trend
SC Leung
 
RSA - Behind the scenes of a fake token mobile app operation
juan_h
 
RSA Monthly Online Fraud Report -- February 2014
EMC
 
CNIT 128 5: Mobile malware
Sam Bowne
 
Malware on Smartphones and Tablets - The Inconvenient Truth
AGILLY
 
The Current State of Cybercrime 2014
EMC
 
Avoiding Bad URL's In the Mobile Web
Alliance Data card services - Know More Sell More
 
Mobile Malware
Martin Holovský
 
I haz you and pwn your maal
Harsimran Walia
 
h@kin9 & vulnerability assessment in android
jaswanth chodavarapu
 
Android malware overview, status and dilemmas
Tech and Law Center
 
Methods of Cybersecurity Attacks
ZyrellLalaguna
 
Les 10 risques liés aux applications mobiles
Bee_Ware
 
Operation Buhtrap - AVAR 2015
ESET
 
Ad

More from Hacks in Taiwan (HITCON) (20)

PDF
20240921 - HITCON 社群活動《CTF 轉生-到了業界就拿出真本事》- bruce30262 講師分享
Hacks in Taiwan (HITCON)
 
PDF
20240921 - HITCON 社群活動《CTF 轉生-到了業界就拿出真本事》- 林思辰 講師分享
Hacks in Taiwan (HITCON)
 
PDF
20240921 - HITCON 社群活動《CTF 轉生-到了業界就拿出真本事》 - Nini 分享
Hacks in Taiwan (HITCON)
 
PDF
20240921 - HITCON 社群活動 - 《HITCON CTF 甘苦談》
Hacks in Taiwan (HITCON)
 
PDF
HITCON FreeTalk 20240726 - Dark side of the Force - 探索暗網威脅【 議題三:藍隊的暗網事件應變守則】
Hacks in Taiwan (HITCON)
 
PDF
HITCON FreeTalk 20240726 - Dark side of the Force - 探索暗網威脅【 議題二:Residential p...
Hacks in Taiwan (HITCON)
 
PDF
HITCON FreeTalk 20240726 - Dark side of the Force - 探索暗網威脅【 議題一:Drive Into th...
Hacks in Taiwan (HITCON)
 
PDF
HITCON FreeTalk 2024 台灣駭客協會媒體小聚【議題二:Cyber War - 網路戰與地緣政治】
Hacks in Taiwan (HITCON)
 
PDF
HITCON FreeTalk 2024 台灣駭客協會媒體小聚【議題一:資安地圖 - 資安領域與趨勢介紹】
Hacks in Taiwan (HITCON)
 
PDF
HITCON CISO Summit 2023 - Closing
Hacks in Taiwan (HITCON)
 
PDF
HITCON FreeTalk 2022 - 自己的SOC自己管-- SOC建置的心路歷程分享
Hacks in Taiwan (HITCON)
 
PDF
HITCON FreeTalk 2022 - Zero Trust Architecture 讀書筆記
Hacks in Taiwan (HITCON)
 
PDF
HITCON FreeTalk 2022 - Defeat 0day is not as Difficult as You Think
Hacks in Taiwan (HITCON)
 
PPTX
【HITCON FreeTalk 2022 - 我把在網頁框架發現的密碼學漏洞變成 CTF 題了】
Hacks in Taiwan (HITCON)
 
PDF
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
Hacks in Taiwan (HITCON)
 
PDF
【HITCON FreeTalk 2018 - Spectre & Meltdown 漏洞的修補策略與 risk mitigation】
Hacks in Taiwan (HITCON)
 
PDF
【HITCON FreeTalk 2018 - 從晶片設計角度看硬體安全】
Hacks in Taiwan (HITCON)
 
PDF
【HITCON FreeTalk】Supply Chain Attack
Hacks in Taiwan (HITCON)
 
PDF
【HITCON FreeTalk】HITCON 2017 下半年活動介紹
Hacks in Taiwan (HITCON)
 
PPTX
【HITCON Hackathon 2017】 TrendMicro Datasets
Hacks in Taiwan (HITCON)
 
20240921 - HITCON 社群活動《CTF 轉生-到了業界就拿出真本事》- bruce30262 講師分享
Hacks in Taiwan (HITCON)
 
20240921 - HITCON 社群活動《CTF 轉生-到了業界就拿出真本事》- 林思辰 講師分享
Hacks in Taiwan (HITCON)
 
20240921 - HITCON 社群活動《CTF 轉生-到了業界就拿出真本事》 - Nini 分享
Hacks in Taiwan (HITCON)
 
20240921 - HITCON 社群活動 - 《HITCON CTF 甘苦談》
Hacks in Taiwan (HITCON)
 
HITCON FreeTalk 20240726 - Dark side of the Force - 探索暗網威脅【 議題三:藍隊的暗網事件應變守則】
Hacks in Taiwan (HITCON)
 
HITCON FreeTalk 20240726 - Dark side of the Force - 探索暗網威脅【 議題二:Residential p...
Hacks in Taiwan (HITCON)
 
HITCON FreeTalk 20240726 - Dark side of the Force - 探索暗網威脅【 議題一:Drive Into th...
Hacks in Taiwan (HITCON)
 
HITCON FreeTalk 2024 台灣駭客協會媒體小聚【議題二:Cyber War - 網路戰與地緣政治】
Hacks in Taiwan (HITCON)
 
HITCON FreeTalk 2024 台灣駭客協會媒體小聚【議題一:資安地圖 - 資安領域與趨勢介紹】
Hacks in Taiwan (HITCON)
 
HITCON CISO Summit 2023 - Closing
Hacks in Taiwan (HITCON)
 
HITCON FreeTalk 2022 - 自己的SOC自己管-- SOC建置的心路歷程分享
Hacks in Taiwan (HITCON)
 
HITCON FreeTalk 2022 - Zero Trust Architecture 讀書筆記
Hacks in Taiwan (HITCON)
 
HITCON FreeTalk 2022 - Defeat 0day is not as Difficult as You Think
Hacks in Taiwan (HITCON)
 
【HITCON FreeTalk 2022 - 我把在網頁框架發現的密碼學漏洞變成 CTF 題了】
Hacks in Taiwan (HITCON)
 
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
Hacks in Taiwan (HITCON)
 
【HITCON FreeTalk 2018 - Spectre & Meltdown 漏洞的修補策略與 risk mitigation】
Hacks in Taiwan (HITCON)
 
【HITCON FreeTalk 2018 - 從晶片設計角度看硬體安全】
Hacks in Taiwan (HITCON)
 
【HITCON FreeTalk】Supply Chain Attack
Hacks in Taiwan (HITCON)
 
【HITCON FreeTalk】HITCON 2017 下半年活動介紹
Hacks in Taiwan (HITCON)
 
【HITCON Hackathon 2017】 TrendMicro Datasets
Hacks in Taiwan (HITCON)
 
Ad

Recently uploaded (20)

PPTX
LUBRICANTS presentation slides with types functions and all
dahalsabal2020
 
PDF
Pesticides | Natural Pesticides | Methods of control | Types of pesticides | ...
Home
 
PPTX
Remote Healthcare Technology Use Cases and the Contextual Integrity of Olde...
Daniela Napoli
 
PPTX
Rotary_Fundraising_Overview_Updated_new video .pptx
allangraemeduncan
 
PPTX
Influencing Factors of Business Environment of Vegetables Selling Business
auntorkhastagirpujan
 
PPTX
DPIC Assingment_1.pptx.pptx for presentation
yashwork2607
 
PPTX
Patient with Upper & Lower GI bleeding .pptx
bdmlwb701
 
PDF
Exploring User Perspectives on Data Collection, Data Sharing Preferences, and...
Daniela Napoli
 
PPTX
Ocean_and_Freshwater_Awareness_Presentation.pptx
Suhaira9
 
PDF
Thu Dinh - CIE-RESEARCH-METHODS-SLIDES-sample-extract.pptx.pdf
dinhminhthu1405
 
PPTX
“Mastering Digital Professionalism: Your Online Image Matters”
ramjankhalyani
 
PPTX
Renters' Rights and PBSA. How the bill will impact on the sector
Nick Emms
 
PPTX
Describing the Organization's General Environment Identifying the Most Impact...
auntorkhastagirpujan
 
PDF
COSHH - Sri Ramachandar Bandi HSE in the Oil & Gas Industry (COSHH) Training ...
babufastdeals
 
DOCX
Ss Peter & Paul Choir Formation Training
kiambutownshipsecond
 
PDF
Green Natural Green House Presentation (2).pdf
SaeedOsman6
 
PPTX
2025-07-27 Abraham 09 (shared slides).pptx
Dale Wells
 
PDF
SXSW Panel Picker: Placemaking: Culture is the new cost of living
GabrielCohen28
 
PDF
Securing Africa’s future: Technology, culture and the changing face of threat
Kayode Fayemi
 
PDF
Mathematics Grade 11 Term 1 Week 1_2021.pdf
MalepyaneMokgatle
 
LUBRICANTS presentation slides with types functions and all
dahalsabal2020
 
Pesticides | Natural Pesticides | Methods of control | Types of pesticides | ...
Home
 
Remote Healthcare Technology Use Cases and the Contextual Integrity of Olde...
Daniela Napoli
 
Rotary_Fundraising_Overview_Updated_new video .pptx
allangraemeduncan
 
Influencing Factors of Business Environment of Vegetables Selling Business
auntorkhastagirpujan
 
DPIC Assingment_1.pptx.pptx for presentation
yashwork2607
 
Patient with Upper & Lower GI bleeding .pptx
bdmlwb701
 
Exploring User Perspectives on Data Collection, Data Sharing Preferences, and...
Daniela Napoli
 
Ocean_and_Freshwater_Awareness_Presentation.pptx
Suhaira9
 
Thu Dinh - CIE-RESEARCH-METHODS-SLIDES-sample-extract.pptx.pdf
dinhminhthu1405
 
“Mastering Digital Professionalism: Your Online Image Matters”
ramjankhalyani
 
Renters' Rights and PBSA. How the bill will impact on the sector
Nick Emms
 
Describing the Organization's General Environment Identifying the Most Impact...
auntorkhastagirpujan
 
COSHH - Sri Ramachandar Bandi HSE in the Oil & Gas Industry (COSHH) Training ...
babufastdeals
 
Ss Peter & Paul Choir Formation Training
kiambutownshipsecond
 
Green Natural Green House Presentation (2).pdf
SaeedOsman6
 
2025-07-27 Abraham 09 (shared slides).pptx
Dale Wells
 
SXSW Panel Picker: Placemaking: Culture is the new cost of living
GabrielCohen28
 
Securing Africa’s future: Technology, culture and the changing face of threat
Kayode Fayemi
 
Mathematics Grade 11 Term 1 Week 1_2021.pdf
MalepyaneMokgatle
 

【HITCON FreeTalk 2021 - From fakespy to Guerilla: Understanding Android malware crime gangs】

  • 1. TLP:WHITE From FakeSpy to Guerilla Understanding Android Malware Crime Gangs Fyodor Yarochkin (with help of Paul Pajeres, Vladimir Kropotov, Ecular Xu, Zhengyu Dong) Trend Micro Research
  • 2. Copyright 2021 Trend Micro Inc. 2 TLP:WHITE Introduction
  • 3. Copyright 2021 Trend Micro Inc. 3 TLP:WHITE Why Mobile phones are targets? • Mobile often phones ~= ATM cards with Antennas • Telecom carriers ~= Banking Institutions • Less regulated, more connected, easier to break, compromise and remotely control
  • 4. Copyright 2021 Trend Micro Inc. 4 TLP:WHITE Reasons for Android Phones being targetd 1. Money theft 2. Cyber espionage 3. Data breaches 4. Ransomware (targeted) 5. Crypto currencies
  • 5. Copyright 2019 Trend Micro Inc. 5 TLP:WHITE Geographical specifics • Many online IDs are bound to a phone in China • Mobile Phones allow balance transfers in a number of countries including china, india • Verified phone numbers in some countries allow caller impersonation
  • 6. Copyright 2021 Trend Micro Inc. 6 TLP:WHITE Criminals interest in android platforms? • Money (banking) • Virtual currencies • Access to other apps and accounts in bulk • Access to phone numbers
  • 7. Copyright 2021 Trend Micro Inc. 7 TLP:WHITE Numbers are valuable commodity
  • 8. Copyright 2021 Trend Micro Inc. 8 TLP:WHITE Lets take a look at some examples • Fakespy • Anubis • Guerilla
  • 9. Copyright 2021 Trend Micro Inc. 9 TLP:WHITE A good illustration what hackers want from a phone • Mail • Storage • Finance • Online accounts • Crypto currencies
  • 10. Copyright 2021 Trend Micro Inc. 10 TLP:WHITE Fakespy
  • 11. Copyright 2021 Trend Micro Inc. 11 TLP:WHITE How It Works SMS with malicious link Poses as courier service, Chrome update, others. Prompt to install malicious iOS profile to configure Wifi, email accounts, etc Prompts to install malicious Android app Display Apple phishing or illegal Casino site Monitor device activity like SMS, device info, router, mobile transactions Connect to SNS account Decrypt content and reveal real C2 server Send and receive information Spread SMS to contacts
  • 12. Copyright 2021 Trend Micro Inc. 12 TLP:WHITE Lifecycle of Fakespy Apps Oct 2017 Dec 2017 Jun 2018 Korean banks (NH Capital, KB Kookmin, Nonghyup Bank) Apr 2019 Oct 2019 2,000+ fake apps up to Nov Label: 日本郵便 Aug 2019 5,400+ fake apps up to Nov Label: DHL Paket 4 fake apps Label: Die Post Jul 2019 1,400+ fake apps up to Nov Label: 智能宅急 便 Started Feb 2016 around 800+ fake apps until Aug 2019 1200+ fake apps in Sep 2019 to Nov Label: CJ 대한통운 Sep 2019 20,000+ fake apps since 2015 Label: Chrome 600+ fake apps since 2017 Label: Facebook 21,600+ fake apps since 2017 Label: 佐川急便 Xloader started Jun 2018 Fakespy started Dec 2017 70+ fake apps Oct & Nov 2019 Label: ヤマト運輸 50+ fake apps Mar to Sep 2019 Label: SEX kr porn 2 fake app MyDocomo 800+ fake apps Mar to Oct 2019 Label: Anshin Scan
  • 13. Copyright 2019 Trend Micro Inc. 13 TLP:WHITE Use of social networks as covert channel
  • 14. Copyright 2021 Trend Micro Inc. 14 TLP:WHITE Fakespy • Fakespy does not target banks but • collects contact information, intercepts SMS • and propagates via SMS. Common lures are • Japan Post, Sagawa Express and Chrome
  • 15. Copyright 2021 Trend Micro Inc. 15 TLP:WHITE Fakespy derrivatives • FakeOps: targets europe (appeared during Covid) • Xloader: banks in Japan
  • 16. Copyright 2021 Trend Micro Inc. 16 TLP:WHITE Fakespy vs Xloader 0 50,000 100,000 150,000 200,000 250,000 300,000 350,000 Jan-19 Feb-19 Mar-19 Apr-19 May-19 Jun-19 Jul-19 Aug-19 Sep-19 Oct-19 Nov-19 Dec-19 Jan-20 Feb-20 Mar-20 Apr-20 May-20 Jun-20 Jul-20 Aug-20 FakeSpy Xloader
  • 17. Copyright 2021 Trend Micro Inc. 17 TLP:WHITE Victims and Infrastrcture • Asia: Korea, Japan, Singapore • Some countries in Europe • Infrastructure: geographically diverse
  • 18. Copyright 2021 Trend Micro Inc. 18 TLP:WHITE Anubis
  • 19. Copyright 2019 Trend Micro Inc. 19 TLP:WHITE What is Anubis?!
  • 20. Copyright 2019 Trend Micro Inc. 20 TLP:WHITE Anubis backend
  • 21. Copyright 2019 Trend Micro Inc. 21 TLP:WHITE Anubis communications
  • 22. Copyright 2019 Trend Micro Inc. 22 TLP:WHITE Objective of Anubis actions: $$$ MONEY!
  • 23. Copyright 2019 Trend Micro Inc. 23 TLP:WHITE
  • 24. Copyright 2021 Trend Micro Inc. 24 TLP:WHITE Guerilla
  • 25. Copyright 2019 Trend Micro Inc. 25 TLP:WHITE
  • 26. Copyright 2019 Trend Micro Inc. 26 TLP:WHITE
  • 27. Copyright 2019 Trend Micro Inc. 27 TLP:WHITE Guerilla app testing lifecycle
  • 28. Copyright 2019 Trend Micro Inc. 28 TLP:WHITE Debugging statements in some modules
  • 29. Copyright 2019 Trend Micro Inc. 29 TLP:WHITE Lots of other functionality
  • 30. Copyright 2019 Trend Micro Inc. 30 TLP:WHITE functionality (2) paramBundle = c.b("{n "birthday": {n "year": 1966,n "month": 6,n "day": 25n },n "gender": "female",n "username": "biukabiuka88" + new Random().nextInt(1000) + "",n "passwd": "d0b22405db",n "key":
  • 31. Copyright 2019 Trend Micro Inc. 31 TLP:WHITE Many victims, globally
  • 32. Copyright 2019 Trend Micro Inc. 32 TLP:WHITE ConclusionJ Trust your phone? Verify your phone? Protect phone?
  • 33. Copyright 2019 Trend Micro Inc. 33 TLP:WHITE Protect your phone :p my phone – my bastion J Questions? ;-) Iphone J
  • 34. Copyright 2021 Trend Micro Inc. 34 TLP:WHITE Thank You! QUESTIONS => [email protected]