New Android malware uses OCR to steal crypto wallet keys from images

Skye Jacobs

Posts: 582   +13
Staff
In brief: Security researchers discovered a particularly alarming form of malware that tricks users into downloading an infected app to propagate. While the attack vector is common, the insidious nature of the malicious code makes it unique. It targets and steals crypto wallet security codes using OCR to scan images for mnemonic passphrases.

A sophisticated new strain of Android malware has emerged from Korea. It targets cryptocurrency wallets by exploiting users' mnemonic keys. McAfee Labs researcher SangRyol Ryu came across the malware after tracing data stolen by malicious apps to rogue servers and gaining access.

The malicious software, dubbed SpyAgent, uses cunning tactics to infiltrate devices and exfiltrate sensitive information, including photos that may contain wallet recovery phrases. SpyAgent disguises itself as legitimate apps, ranging from banking and government services to streaming platforms and utility software. So far, McAfee has identified over 280 of these fake applications.

Once the victim downloads a SpyAgent-infected app, the malware springs into action, establishing a connection with a command and control (C2) server that allows attackers to issue instructions remotely. It then harvests text messages, contact lists, and stored images from the infected device.

What sets this malware apart is its use of optical character recognition (OCR) technology to scan images for mnemonic keys – the 12-word phrases used to recover cryptocurrency wallets. Using mnemonic phrases is rising in crypto-wallet security, as they are easier to remember than a long string of random characters.

SpyAgent has also proved to be wily with its efforts to avoid detection. It diverts the victim's attention from a possible problem with the phone using endless loading screens or brief blank displays.

The malware's creators have proven adept at expanding SpyAgent's reach. It initially targeted users in Korea. However, the malware recently spread to the United Kingdom. It has also transitioned from simple HTTP requests to WebSocket connections, enabling real-time, two-way communication with the C2 server. It has clever techniques to avoid detection from security researchers, including string encoding and function renaming.

SpyAgent makes its way onto victims' devices largely through phishing campaigns. Attackers use social engineering tactics to lure victims into clicking malicious links. These links direct users to convincing fake websites that prompt downloading the malware-laden APK file. The campaigns are proving particularly successful when combined with stolen contact data.

"These phishing messages, seemingly sent by a familiar contact, are more likely to be trusted and acted upon by recipients," Ryu wrote. "For instance, an obituary notice appearing to come from a friend's number could be perceived as authentic, greatly raising the likelihood of the recipient engaging with the scam, especially compared to phishing attempts from unknown sources."

SpyAgent's backend operations are very sophisticated, as the malware's scale indicates. For instance, researchers discovered admin pages designed for managing compromised devices. It also uses Python and Javascript on the server side to process the stolen data, which is then organized and managed through an administrative panel.

Another indication of its sophistication is how quickly it developed legs. The first sighting of SpyAgent was only earlier this year and only in Korea. It has already spread to UK users.

Security researchers hope to stamp out SpyAgent, or at least contain it, now that they know how it works. However, its creators continue refining their techniques, and McAfee believes they are currently developing an iOS version.

Permalink to story:

 
Stop downloading through unofficial app stores. So no side loading and this stuff won't happen.

If I had 10 bitcoin and my choice was phone. That would be the phones sole purpose
Believe people with large amounts of BTC have been home invaded as well
Plus when I travelled in dodgy countries, had 2 wallet, one to use out and about, to be stolen if necessary and main one. In real dodgy places where say whole bus can be stopped in middle of nowhere to be robbed, even had a prepare money belt/document wallet to hand over .

Plus if I had a lot of BTC would split them up so maybe some with most trusted online service . Ones I store would be stored in 2 parts on 2 different systems, maybe 3 as 3rd a physical modifier with backups
 
Your talking about something completely diff. I'd say secure your phone with a max 10 pass phrase before it self destruct(s). Don't use app for management of your crypto, but use a browser.
 
Stop downloading through unofficial app stores. So no side loading and this stuff won't happen.
Oh yes that will totally keep you safe from all those malware ridden apps in official Play store. /s

The real danger is remote code download on legitimate apps that pass Play store security only to then some time later start downloading malware from remote servers to users device.

Another problem is legitimate safe and even useful apps being sold to shady companies who then update the app to be much more predatory than it once was and existing users are none the wiser unless they follow the news closely.

Side-loading is least problematic as most people dont even know it exists or have no reason to use it and those who do generally know what they're doing.
 
Oh yes that will totally keep you safe from all those malware ridden apps in official Play store. /s

The real danger is remote code download on legitimate apps that pass Play store security only to then some time later start downloading malware from remote servers to users device.

Another problem is legitimate safe and even useful apps being sold to shady companies who then update the app to be much more predatory than it once was and existing users are none the wiser unless they follow the news closely.

Side-loading is least problematic as most people dont even know it exists or have no reason to use it and those who do generally know what they're doing.

Correct but not correct; google is tighter and Apple is even more tight.

Just stick with known apps; or stop installing apps you don't really need or have a vague source.

I never have issues with my Iphone - its only because I use the mandatory in regards of apps.
 
Just stick with known apps; or stop installing apps you don't really need or have a vague source.
Like I said in my previous post. Even sticking with known apps is no guarantee that these may not be sold or exploited by bad actors at some point. Yes it is considerably safer than installing new apps but the danger remains.
 
Back