Article Details
Scrape Timestamp (UTC): 2024-10-30 14:54:46.946
Original Article Text
Click to Toggle View
Android malware "FakeCall" now reroutes bank calls to attackers. A new version of the FakeCall malware for Android hijacks outgoing calls from a user to their bank, redirecting them to the attacker's phone number instead. The goal of the latest version remains to steal people's sensitive information and money from their bank accounts. FakeCall (or FakeCalls) is a banking trojan with a focus on voice phishing, in which victims are deceived through fraudulent calls impersonating banks, asking them to convey sensitive information. Kaspersky first reported the trojan in April 2022, featuring realistic-appearing calling interfaces to trick victims into believing they are on a call with their bank. A March 2023 report by CheckPoint warned that FakeCall was now impersonating over 20 financial organizations, offering targets low-interest loans, and featuring new evasion mechanisms to lower detection rates. In addition to vishing (voice phishing), FakeCall could also capture live audio and video streams from the infected devices, allowing attackers to steal sensitive data without victim interaction. Hijacking calls In previous versions, FakeCall prompted users to call the bank from within an app, impersonating the financial institute. Then, a fake screen was overlaid that displayed the bank's actual number while the victim was connected with the scammers. In the latest version analyzed by Zimperium, the malicious app sets itself as the default call handler, asking the user to approve this action upon installing the application through an Android APK. The call handler in Android manages incoming and outgoing calls, essentially serving as the main interface that processes dialing, connecting, and ending calls. When the malware prompts the user to set it as the default call handler, it gains permission to intercept and manipulate both outgoing and incoming calls. A fake call interface mimics the actual Android dialer, displaying trusted contact information and names, elevating the level of deception to a point that's hard for victims to realize. What makes this malware so dangerous is that when a user attempts to call their financial institution, the malware secretly hijacks the call and redirects it to an attacker's phone number instead. "When the compromised individual attempts to contact their financial institution, the malware redirects the call to a fraudulent number controlled by the attacker," explains the new Zimperium report. "The malicious app will deceive the user, displaying a convincing fake UI that appears to be the legitimate Android's call interface showing the real bank's phone number." "The victim will be unaware of the manipulation, as the malware's fake UI will mimic the actual banking experience, allowing the attacker to extract sensitive information or gain unauthorized access to the victim's financial accounts. New features and improvements Despite heavier code obfuscation, Zimperium also discovered that the latest FakeCall versions add several improvements and attack mechanisms, though some are still under development. First, FakeCall added a Bluetooth listener and a screen state monitor, both without malicious functionality yet. The malware now leverages Android's Accessibility Service to gain extensive control over the user interface, allowing it to monitor dialer activity, automatically grant itself permissions, and simulate user actions like clicks and gestures. A new phone listener service establishes a communication channel with the attacker's command and control (C2) server, allowing them to issue commands to perform various actions, like get device location, delete apps, record audio or video, and edit contacts. New commands added on the latest variant include: These additions show that FakeCall is under active development, and its operators are working towards making it a more evasive and formidable banking trojan. Zimperium has published a list of indicators of compromise (IoC), including app package names and APK checksums so users can avoid the malicious apps that carry the malware. However, these are frequently changed by the threat actors. As always, it is suggested that users avoid manually installing Android apps through APKs and instead install them from Google Play. While malware can still make it onto Google's service, when detected, it can be removed by Google Play Protect.
Daily Brief Summary
Android's FakeCall malware has evolved to hijack outgoing bank calls, redirecting them to attackers' numbers.
Originally detected by Kaspersky in 2022, FakeCall now impersonates over 20 financial institutions.
The malware tricks users by displaying a fake call interface that mimics real Android dialer screens, showing legitimate bank numbers while connecting to scammers.
New versions employ advanced evasion tactics and can capture audio and video, increasing the risks of sensitive data theft.
Zimperium's March 2023 analysis reveals that FakeCall uses Android’s Accessibility Service to gain deep control over user interfaces and simulate user actions.
Additional functionalities in development include Bluetooth listening and monitoring screen activity, indicating continuous advancement by its operators.
The malware operators are continually updating attack mechanisms, making it harder to detect and prevent.
Users are advised to avoid sideloading APKs and rely on Google Play for installations to minimize the risk of such infections.