The malicious apps phish for credit card details and internet banking credentials using bogus forms and the data stolen from the victims is leaked online, in plain text, via an exposed server.
The fake apps were uploaded to Google Play in June and July 2018 when ESET notified Google they were taken down, but by then they had been installed by hundreds of victims. The apps were uploaded under three different developer names, each impersonating a different Indian bank: however, all three apps can be traced back to a single attacker.
How do the apps operate?
All three apps follow the same procedure. Upon launch, a form requesting credit card details is displayed (Figure 2). If users fill out the form and hit “Submit”, they are taken to a form asking for their internet banking login credentials (Figure 3). Interestingly, even though all fields are marked as “required” (*), both forms can be successfully submitted empty – a clear indicator of something fishy.
Clicking through both forms – with or without filling them in – leads users to the third and final screen, which thanks users for their interest and informs them that a “Customer Service Executive” will be in touch shortly (Figure 4). Needless to say, no one gets in touch with the victims, and the app offers no further functionality beyond this point.
Meanwhile, the data entered into the bogus forms is sent in plain text to the attacker’s server. The server listing the stolen data is accessible to anyone with the link, without requiring any authentication. For the victims, this amplifies the potential damage, since their sensitive data is not only at the attacker’s disposal, but potentially available to anyone who comes across it.
Just recently, we warned against another malicious app leaking stolen information for anyone to see – a fake MyEtherWallet app, exposing the private keys to victims’ wallets. These discoveries highlight the need for extreme caution when downloading apps related to finances – be it money in the traditional sense of the term, or cryptocurrencies.
How to stay safe
If you’ve installed and used any of these malicious apps, we advise you to uninstall them immediately. Check your bank account for suspicious activity and change your credit card pin code as well as your internet banking password.
To avoid falling victim to phishing apps, we recommend that you:
- Only trust mobile banking apps if they are linked from your bank’s official website
- Never enter your sensitive banking information into online forms if you aren’t sure of their security and legitimacy
- Pay attention to number of downloads, app ratings and reviews when downloading apps from Google Play
- Keep your Android device updated and use a reliable mobile security solution; ESET products detect these malicious apps as Android/Spy.Banker.AHR