Live
- Stage set for counting in Maha, Jharkhand
- MyVoice: Views of our readers 23rd November 2024
- Civic chief expresses ire over poor sanitation
- Deep State behind Adani crisis?
- Collector inspects GGH; asks staff to provide better medicare to poor
- Zero Case: A Saga of Eradication of Polio in India
- Cancel PPAs with Adani companies, demands CPI
- Nuclear saber rattling in Russia-Ukraine war
- AKNU V-C attends GEO India-2024 conference
- SSSG student selected for national painting contest
Just In
Vietnamese hackers fuelling WhatsApp e-challan scam in India: Report
A highly technical Android malware campaign by Vietnamese hackers is targeting Indian users through fake traffic e-challan messages on WhatsApp, according to a report on Wednesday.
Bengaluru: A highly technical Android malware campaign by Vietnamese hackers is targeting Indian users through fake traffic e-challan messages on WhatsApp, according to a report on Wednesday.
Researchers from CloudSEK, a cybersecurity firm, identified the malware as part of the Wromba family.
It has infected more than 4,400 devices and led to fraudulent transactions exceeding Rs. 16 lakh by just one scam operator, they said.
"Vietnamese threat actors are targeting Indian users by sharing malicious mobile apps on the pretext of issuing vehicle challan on WhatsApp,” said Vikas Kundu, Threat Researcher, CloudSEK.
Scammers are sending fake e-challan messages impersonating the Parivahan Sewa or Karnataka Police and tricking people into installing a malicious app.
The app steals personal information and also facilitates financial fraud.
Clicking the link within the WhatsApp message would lead to the download of a malicious APK disguised as a legitimate application.
Once installed, the malware requested excessive permissions, including access to contacts, phone calls, SMS messages, and the ability to become the default messaging app.
It then intercepts OTPs and other sensitive messages, which enables attackers to log in to victims' e-commerce accounts, purchase gift cards, and redeem them without leaving a trace.
Kundu explained that once the app gets installed, it extracts all the contacts to scam more users.
Further, all the SMSes will be “forwarded to the threat actors thus allowing them to log in to various e-commerce and financial apps of the victim,” he added.
Using proxy IPs, the attackers avoid detection and maintain a low transaction profile.
Using the malware, attackers have accessed 271 unique gift cards, conducting transactions worth Rs 16,31,000, according to the report.
Gujarat has been identified as the most affected region, followed by Karnataka.
To protect against such malware threats CloudSEK urged users to stay vigilant and adopt security best practices installing apps only from trusted sources like Google Play Store; limiting app permissions and regularly reviewing them, maintaining updated systems, and enabling alerts for banking and sensitive services.
© 2024 Hyderabad Media House Limited/The Hans India. All rights reserved. Powered by hocalwire.com