Android malware intercepts calls to banks, redirecting victims to fraudulent numbers

Skye Jacobs

Posts: 587   +13
Staff
Bottom line: The most alarming aspect of FakeCall is its ability to simulate incoming calls from bank employees. This feature is designed to reassure victims that nothing is amiss and to trick them into divulging account credentials through social engineering tactics.

First identified in 2022, FakeCall is a malicious piece of software that was developed to hijack bank accounts. It does this by intercepting calls made to financial institutions and then redirecting them to cybercriminals who impersonate bank representatives to extract sensitive information and gain unauthorized access to victims' funds – a con called voice phishing, or "vishing" for short. In the years since, it has undergone significant evolution and reemerged with alarming new capabilities, presenting an even greater danger to Android users around the world.

A total of 13 new variants of FakeCall have been discovered by researchers at mobile security firm Zimperium. They showcase a range of new and enhanced capabilities that indicate a substantial investment by the attackers.

One of the most significant advancements is the increased level of obfuscation employed by the malware. The new variants utilize a dynamically decrypted and loaded .dex file to conceal their malicious code, making detection and analysis more challenging.

FakeCall's primary method of infection is similar to the earlier versions. The malware typically enters a victim's device through a phishing attack, tricking users into downloading an APK file that acts as a dropper. Once installed, this dropper deploys the malicious payload, establishing communication with a Command and Control (C2) server.

The malware's core functionality revolves around its ability to intercept and manipulate phone calls. When installed, FakeCall prompts the user to set it as the device's default call handler. This seemingly innocuous request grants the malware extensive control over all incoming and outgoing calls.

FakeCall's sophisticated call interception system allows it to monitor outgoing calls and transmit this information to its C2 server. When a victim attempts to contact their bank, the malware can redirect the call to a number controlled by the attackers. To maintain the deception, FakeCall displays a convincing fake user interface that mimics the legitimate Android call interface, complete with the real bank's phone number.

The latest variants of FakeCall introduce several new components, some of which appear to be still in development. A Bluetooth Receiver monitors Bluetooth status and changes, though its exact purpose remains unclear. Similarly, a Screen Receiver monitors the screen's state without any apparent malicious activity in the source code.

A new Accessibility Service, inherited from the Android Accessibility Service, grants the malware significant control over the user interface and the ability to capture information displayed on the screen; this demonstrates the malware's increased sophistication. Based on analysis of earlier versions, it could potentially monitor dialer activity, automatically grant permissions to the malware, and even allow remote attackers to take full control of the victim's device UI.

Additionally, a Phone Listener Service acts as a bridge between the malware and its command and control server, enabling attackers to issue commands and execute actions on the infected device.

Permalink to story:

 
If this malware can intercept bank calls, surely it can intercept all calls. Snooping 101 and a new level of cell phone ransomware or blackmail. It's going to happen.
 
Oh so scary Oh I have an Android and today ends in Y

"Zimperium’s Mobile Threat Defense (MTD) and Runtime Protection SDK (Zimperium zDefend) are fully protected from FakeCall and these new variants,"

This is mostly to market their protection

So you get a phishing scam - phishing scams don't need a tech element , they are mostly social, yet this has a tech element - here down load this app. bypass all the warnings and sideload it onto your phone

Don't think having the Golden IPhone will help some from targeted phishing attacks, You need to pay $2000 to bail your daughter, I strongly recommend it, they don't segregate prisoners here - probably now can even generate a "recorded" voice message -" help me Dad you are my only hope"

td;dr don't download and install apk or whatever they are called because someone asks you to

As I said most big steals are social mostly
 
If an app I installed wanted to set itself as a default call handler it would a major red flag for me. I always look at what permissions an app requires an why. I have not installed many apps simply because they're gone overboard with permissions. Even those I do install I sometimes selectively disable permissions if I dont use the functionality or I feel it's not necessary. Also I never call my bank and my bank never calls me. And even if I did I would never disclose any passwords via phone call or do some sort of financial transactions that way.
 
Back