Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

2/27/2019
12:00 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Whose Line Is It? When Voice Phishing Attacks Get Sneaky

Researchers investigate malicious apps designed to intercept calls to legitimate numbers, making voice phishing attacks harder to detect.

What if social engineers, instead of calling victims with voice phishing attacks, intercepted phone calls their victims make to legitimate phone numbers? Malicious apps let cybercriminals do just that – a tactic that puts a subtle twist on traditional voice phishing.

Min-Chang Jang, manager at Korea Financial Security Institute and Korea University, began investigating these apps in September 2017 when he received a report of an app impersonating a financial firm. Analysis revealed a phone interception feature in the app, which intrigued him.

That's how Jang discovered a new type of voice phishing crime, which combines traditional voice phishing with malicious apps to trick unsuspecting callers into chatting with cybercriminals.

Here's how they work: An attacker must first convince a victim to download an app. The attacker may send a link to the victim, enticing the person with something like a low-interest loan, and prompt him to install the app for it. If the target takes the bait and later calls a financial company for loan consultation, the call is intercepted and connected to the attacker.

"The victims believe that they are talking to a financial company employee, but they aren't," Jang says. It's unlikely victims will know a scam is taking place, he says. Most of these attacks mimic apps from financial firms.

Unfortunately, when Jang and his research team first discovered malicious apps with the interception feature, they didn't have access to a live malicious app distribution server because it had already been closed by the time they received victim reports. In April 2018, Jang found a live distribution server – a pivotal point for their research into malicious phishing apps.

This particular distribution server had a very short operating cycle, ranging from a few hours to two days. "I found it while monitoring community sites for the information gathering," Jang explains. He discovered a post written to educate users to be careful of phishing sites; fortunately, it discussed the malicious applications they were hoping to investigate.

"I found a specific string in the Web page source code of a live malware distribution server," he says, "and I used the string for scanning to get more malware distribution servers." 

With access to one server, researchers could check which of its ports were open and access the Web page source code. Based on those strings of code from the first distribution server, they were able to create a real-time malicious app collection script, Jang explains. The automated system they created is able to collect malware distribution servers and apps in near real time.

Using this script, researchers have been able to find malicious app distribution servers and variant malicious apps. Following their discovery of the first live distribution server, they have collected about 3,000 malicious apps from various servers. The command-and-control (C2) server address was hard-coded inside malicious apps, Jang says, and could be easily extracted.

Their research continued to unfold. The team analyzed the C2 server, where they discovered a file containing the account data they needed to access it. This data helped the team gain the privileges of the Windows server admin of the distribution server and of the database admin of the C2 server. A Remote Desktop Protocol (RDP) connection to the server led to more information – the team confirmed this attacker was connecting to the Internet via the Point-to-Point Protocol over Ethernet (PPPoE), a sign the server's location was in Taiwan.

In a presentation at Black Hat Asia, entitled "When Voice Phishing Met Malicious Android App," Jang will disclose and discuss the findings of criminal traces in voice phishing analysis conducted by his research team over the past few months.

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
2/28/2019 | 6:22:38 PM
Re: More app trouble
Yeah, I'm at the point where I just never answer the phone unless I either recognize the number or I'm specifically expecting a call. If it's a real person with a good reason for calling, they'll leave a voicemail.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
2/27/2019 | 3:52:03 PM
Re: More app trouble
Agree - NEVER trust the phone - we get scam calls all of the time and a few i enjoy such as telling the famous Microsoft engineer I have a bug on my system.  Takes anger to good use.  (My former manager is better, he tries then to upload ransomware to THEIR system for the revenge of it).   About 5% of inicoming calls are real and the rest junk.  Silence phone calls to - and spoof phone numbers.  Don't answer really unless sometimes I just want a bit of threathunting to see who calls.  
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
2/27/2019 | 2:15:22 PM
More app trouble
Apps, extensions, add-ons, widgets -- just stay away from 'em, people, unless they are very well vetted.
97% of Americans Can't Ace a Basic Security Test
Steve Zurier, Contributing Writer,  5/20/2019
TeamViewer Admits Breach from 2016
Dark Reading Staff 5/20/2019
How a Manufacturing Firm Recovered from a Devastating Ransomware Attack
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-7201
PUBLISHED: 2019-05-22
CSV Injection was discovered in ProjectSend before r1053, affecting victims who import the data into Microsoft Excel.
CVE-2018-7803
PUBLISHED: 2019-05-22
A CWE-754 Improper Check for Unusual or Exceptional Conditions vulnerability exists in Triconex TriStation Emulator V1.2.0, which could cause the emulator to crash when sending a specially crafted packet. The emulator is used infrequently for application logic testing. It is susceptible to an attack...
CVE-2018-7844
PUBLISHED: 2019-05-22
A CWE-200: Information Exposure vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause the disclosure of SNMP information when reading memory blocks from the controller over Modbus.
CVE-2018-7853
PUBLISHED: 2019-05-22
A CWE-248: Uncaught Exception vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause denial of service when reading invalid physical memory blocks in the controller over Modbus
CVE-2018-7854
PUBLISHED: 2019-05-22
A CWE-248 Uncaught Exception vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause a denial of Service when sending invalid debug parameters to the controller over Modbus.