• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

Crypto scam apps infiltrate Apple App Store and Google Play

Bill Toulas by Bill Toulas
February 1, 2023
Reading Time: 3 mins read
0
Crypto scam apps infiltrate Apple App Store and Google Play

Crypto scam apps infiltrate Apple App Store and Google Play

RELATED POSTS

CISA warns govt agencies of recently patched Barracuda zero-day

QBot malware abuses Windows WordPad EXE to infect devices

Hot Pixels attack checks CPU temp, power changes to steal data

Operators of high-yielding investment scams known as “pig butchering” have found a way to bypass the defenses in Google Play and Apple’s App Store, the official repositories for Android and iOS apps.

Pig butchering scams have been happening for a few years. They use involve fake websites, malicious advertising, and social engineering. By adding fraudulent apps to official download platforms, scammers can gain a victim’s trust easier.

Researchers at cybersecurity company Sophos say that the scammers are targeting victims on Facebook or Tinder and convince them to download the fraudulent apps and “invest” large amounts of money into assets purported to be real.

Sophos observed such a campaign from a China-based threat group named “ShaZhuPan,” which shows high organizational levels with distinct teams doing victim interaction, finance, franchise, and money laundering.

Approaching victims

The fraudsters appear to target male users over Facebook and Tinder using women’s profiles with stolen images from other social media accounts.

The profiles the scammers control were built to reflect a lavish lifestyle, with photos of high-end restaurants, expensive shops, and exotic locations.

Buy JNews
ADVERTISEMENT
Images used in the fake profiles
Images used in the fake profiles (Sophos)

After gaining the victims’ trust, the scammers say that they have an uncle working for a financial analysis firm and launch an invitation to trade cryptocurrency via an app on Play Store or App Store. Obviously, the victim is directed to a fake app.

The fraudsters guide the victim through their first investment, instructing them to create a deposit on the legitimate cryptocurrency exchange platform Binance and then transfer the amount to the fake app.

“Pig butchering” apps

The malicious apps used in the campaign that Sophos observed are named “Ace Pro” and “MBM_BitScan” on the Apple App Store and “BitScan” on Play Store.

MBM_Bitscan on the Apple App Store
MBM_Bitscan on the Apple App Store (Sophos)

The apps let the victim withdraw small amounts of cryptocurrency initially but then lock their accounts when larger amounts are involved. However, the initial withdrawal is enough to make the victims trust the scheme and keep investing.

The method used to bypass the security checks in the mobile apps stores is quite simple. For infiltrating the App Store, the ShaZhuPan gang submits an app signed with a valid certificate issued by Apple, a requirement for getting any code to be accepted into the iOS repository.

Until the approval is obtained, the app connects to a benign server and its behavior is legitimate. Once it passes the review, the developer changes the domain and the app connects to a malicious server.

Evading detection from security reviewers
Evading detection from security reviewers (Sophos)

After launching the app, the victim sees a cryptocurrency trading interface delivered from the malicious server. However, everything displayed is fake, except for the user’s deposit.

Sophos researchers discovered that the BitScan apps for Android and iOS have a different vendor name but communicate with the same command and control server, from a domain that appears to impersonate bitFlyer, a legitimate cryptocurrency exchange company in Japan.

The AcePro app investment interface
The AcePro app investment interface (Sophos)

Because these apps are only downloaded by a small number of targeted users, they’re not massively reported for fraud, making it hard for app store security reviewers to identify them as fraudulent and remove them.

Don’t get scammed

Pig butchering scams yield high profits in a short time, so the scammers are motivated to put in the time and effort to gain the trust of their victims through extensive communication.

This lengthy engagement, the initial withdrawal, and the convincing interface in the fake apps make it difficult for the victim to see through the scam.

Sophos also points out that the emergence of “FinTech” has normalized people’s trust in these software tools and when the apps are sourced from official Apple and Google stores, the sense of legitimacy is high.

Before installing any app on your smartphone, it is recommended to check reviews from other users, the privacy policy, the developer/publisher details, and look for information about the company.

Share54Tweet34Pin12
Bill Toulas

Bill Toulas

Related Posts

CISA orders govt agencies to update iPhones, Macs by May 1st
Cyber Security

CISA warns govt agencies of recently patched Barracuda zero-day

May 27, 2023
New QakNote attacks push QBot malware via Microsoft OneNote files
Cyber Security

QBot malware abuses Windows WordPad EXE to infect devices

May 27, 2023
Hot Pixels attack checks CPU temp, power changes to steal data
Cyber Security

Hot Pixels attack checks CPU temp, power changes to steal data

May 27, 2023
Time to challenge yourself in the 2023 Google CTF!
Cyber Security

Time to challenge yourself in the 2023 Google CTF!

May 26, 2023
Time to challenge yourself in the 2023 Google CTF!
Cyber Security

Time to challenge yourself in the 2023 Google CTF!

May 26, 2023
The Week in Ransomware – December 16th 2022 – Losing Trust
Cyber Security

The Week in Ransomware – May 26th 2023 – Cities Under Attack

May 26, 2023

Recommended Stories

Apple and Google team up to fight Bluetooth tracker stalking

Apple and Google team up to fight Bluetooth tracker stalking

May 2, 2023
ANKR Price Prediction – Can the altcoin rebound after March?

ANKR Price Prediction – Can the altcoin rebound after March?

May 23, 2023
Optimism [OP] briefs on new upgrade as Arbitrum [ARB] leads in L2 race

Optimism [OP] briefs on new upgrade as Arbitrum [ARB] leads in L2 race

April 30, 2023

Popular Stories

  • New Python malware backdoors VMware ESXi servers for remote access

    Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

    137 shares
    Share 55 Tweet 34
  • Facts and myths about the warriors who raided Europe and explored the New World

    137 shares
    Share 55 Tweet 34
  • Exploit released for actively abused ProxyNotShell Exchange bug

    137 shares
    Share 55 Tweet 34
  • New Windows Server updates cause domain controller freezes, restarts

    136 shares
    Share 54 Tweet 34
  • Bing Chat’s secret modes turn it into a personal assistant or friend

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE »

Recent Posts

  • XRP settlement: A turning point in US crypto regulations?
  • Uniswap spikes despite StarkNet; Avalanche in pursuit?
  • Avorak AI: A leading force in the crypto space

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?