"FluHorse," a new Android malware, has been discovered. It targets users in Eastern Asia with malicious apps that look like legitimate versions and have been installed more than 1,00,000 times. These malicious applications, according to Check Point Research, are made to steal user credentials and Two-Factor Authentication (2FA) codes. FluHorse malware focuses on different areas in Eastern Asia and is normally conveyed by means of email.
During the initial stages of the phishing email attack, high-profile individuals, such as government officials, were the target in some instances. One of the most disturbing parts of FluHorse is its capacity to go undetected for extensive stretches of time, making it a diligent and perilous danger that is hard to identify. The report claims that the FluHorse attacks begin with targeted, malicious emails sent to prominent individuals urging them to resolve an alleged payment issue right away.
Typically, the target is referred to a phishing website via an email hyperlink. They are prompted to download the bogus APK (Android package file) of the bogus application once they get there. The FluHorse carrier apps imitate "ETC," a toll collection app from Taiwan, and "VPBank Neo," a banking app from Vietnam. Over a million people have downloaded both legitimate versions of these apps from Google Play.
In addition, the report stated that each of the fake apps makes a request for SMS access upon installation in order to intercept incoming 2FA codes in the event that they are required to hijack accounts. The fake apps have user interfaces that look like the real thing, but they only have two or three windows that load forms that take the victim's information. Following the catch of the casualties' record qualifications and charge card data, the applications show a "framework is occupied" message for 10 minutes to cause the cycle to seem sensible while the administrators act behind the scenes to block 2FA codes and influence the taken information.
© Copyright 2023. All Rights Reserved Powered by Vygr Media.