We used VirusTotal to search for an XLoader sample (bf0ad39d8a19b9bc385fb629e3227dec4012e1f5a316e8a30c932202624e8e0e) in July and learned that the sample was downloaded from a malicious domain posing under the name of the said home delivery service company. Interestingly, almost all FakeSpy variants posed as the abovementioned Japanese apps to steal sensitive information from users.ĭigging deeper into the activities of XLoader and FakeSpy, we learned that they use the same ecosystem to deploy malware. The first clue that led to the discovery of the connection between XLoader and FakeSpy is when the former was observed disguising as a legitimate app of a major Japanese home delivery service company in June. XLoader and FakeSpy posed as legitimate apps of a Japanese home delivery service company However, our new research uncovered clues that could indicate that they are either being operated by the same threat actor group or that their operators are affiliated with each other. When we released our initial findings on XLoader and FakeSpy, they appeared to have nothing to do with each other. Monthly infection count for XLoader and FakeSpy attacks this year ![]() Meanwhile, we released our findings on FakeSpy in June after it infected Android users via SMS phishing or SMiShing to launch info-stealing attacks.Īs of October, there have been a total of 384,748 victims from XLoader and FakeSpy attacks globally, with the majority of victims coming from South Korea and Japan.įigure 1. We first reported about XLoader in April 2018 when it used Domain Name System (DNS) cache poisoning/DNS spoofing to victimize users with malicious Android apps that steal PII and financial data and install additional apps. XLoader and FakeSpy are two of the most prevalent malware families that emerged from the mobile threat landscape recently.
0 Comments
Leave a Reply. |