• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

“FakeCalls” Android Malware Targets Financial Firms in South Korea

You are here: Home / Cyber Security News / “FakeCalls” Android Malware Targets Financial Firms in South Korea

A new Android vishing (voice phishing) malware tool has been spotted concentrating on victims in South Korea by impersonating 20 primary money institutions in the area.

Dubbed “FakeCalls” by the Check Point Exploration (CPR) crew, the malware baits victims with fake financial loans, requesting them to validate their credit score card numbers, which are then stolen.

“FakeCalls malware possesses the features of a Swiss military knife, able not only to conduct its most important aim but also to extract private knowledge from the victim’s device,” said CPR cybersecurity researcher Alexander Chailytko.

In a report released by CPR on Tuesday, the company verified it uncovered around 2500 samples of the FakeCalls malware in a blend of mimicked economic companies and implemented evasion procedures.

More, the staff claimed the malware builders created further initiatives to secure their malware from antivirus programs, applying numerous unique evasion techniques not earlier observed by CPR in the wild.

“The malware builders took special treatment with the technological factors of their generation as perfectly as implementing various one of a kind and successful anti-investigation methods,” Chailytko discussed. “In addition, they devised mechanisms for disguised resolution of the command-and-management servers at the rear of the functions.”

The security professional also warned that the techniques applied by FakeCalls could be reused in other applications concentrating on other markets close to the environment.

Read through much more on vishing right here: Hybrid Vishing Assaults Soar 625% in Q2

“I strongly advocate Android users in South Korea not to provide any particular details in excess of the phone and be suspicious of phone phone calls from unidentified figures,” Chailytko concluded.

To defend versus very similar vishing assaults, the CPR report consists of numerous added security recommendations. 

These include becoming on the lookout for strange pauses or delays in advance of a particular person speaks and asking callers to verify or relay critical specifics, such as website URLs or task titles. It also advises consumers not to react to automatic messages as this could allow cybercriminals to record their voices, which could potentially be utilized for authentication in other attacks.

The CPR results affirm former statements from Proofpoint, who mentioned in December very last calendar year vishing would be among the threat vectors becoming significantly used in 2023.

Some parts of this article are sourced from:
www.infosecurity-journal.com

Previous Post: « Tick APT Group Hacked East Asian DLP Software Firm
Next Post: Humans Still More Effective Than ChatGPT at Phishing »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Deepfake Defense in the Age of AI
  • North Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress
  • Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency
  • Türkiye Hackers Exploited Output Messenger Zero-Day to Drop Golang Backdoors on Kurdish Servers
  • ASUS Patches DriverHub RCE Flaws Exploitable via HTTP and Crafted .ini Files

Copyright © 2025 · AllTech.News, All Rights Reserved.