Fake Finance Apps Focus On Theft

Criminals have published hundreds of bogus banking, finance, and crypto-currency apps that steal your money. A team of researchers at Sophos say they have identified as many as 167 fake banking, trading and crypto-currency apps that criminals are using to steal money and financial information from unsuspecting users.

These fraudulent applications are aimed at exploiting the increased interest in trading apps, driven by the recent significant rise in the value of crypto-currencies.

These are also led by interest in low-cost or free stock trading driven by stories like that of the recent social-media driven speculation in GameStop stock where there has been an extraordinary rise in the share price of the ailing video games retailer GameStop amid a surge of bets by small investors. 

The researchers discovered the fake apps while investigating another bogus mobile trading app, which presented itself as one linked to Asian gold trading firm Goldenway Group. The cyber criminals operating these fake Android and iOS apps used counterfeit websites, social engineering techniques, and a fake iOS App Store download page to trick potential victims into believing that they were downloading and installing a legitimate app. In one case, scammers targeted a user through a dating website, where they tricked him into downloading a fake crypto-currency trading app. They avoided requests for face-to-face meetings, citing the pandemic, but encouraged the user to buy crypto-currency and transfer it into their wallet. When the victim tried to close the account or withdraw money, the scammers blocked account access.

Sophos said all the fraudulent apps it identified use a common server and similar designs, suggesting that a single group or entity is responsible.

Some apps offered a customer support chat option, and were observed to be using near-identical language when contacted.
During investigation of one of the apps Sophos encountered a server which was hosting hundreds of fake trading, banking, foreign exchange, and crypto currency apps. 

Among them were counterfeit apps impersonating major financial firms and popular crypto-currency trading platforms, including Barclays, Gemini, Bitwala, Kraken, Binance, BitcoinHK, Bittrex, BitFlyer, and TDBank. Each of these fake apps had a dedicated website tailored to the impersonated brand to better fool potential victims. "People trust the brands and people they know, or think they know, and the operators behind these fake trading and crypto-currency scams ruthlessly take advantage of that," said Jagadeesh Chandraiah, a senior threat researcher at Sophos.

To protect themselves against this kind of scam, Chandraiah advised mobile users to only install apps from trusted sources, like Apple and Google's official app stores. He also stressed the need for people to be cautious about websites or apps that claim unrealistically high returns on investments. "If something seems too good to be true - promised high returns on investments, or professional-looking dating profiles asking to transfer money or crypto assets - it's likely a scam," Chandraiah said.

Unverified and third-party mobile apps are a long-standing and growing security issue. Last year, researchers reported about two malware campaigns targeting Android users with apps that claimed to optimise smartphone performance but actually delivered malware. 

Also last year, researchers at Kaspersky uncovered a cyber espionage campaign that had used the Google Play Store to distribute malware for about four years, proving that even the official app stores aren't completely safe.
Dubbed 'PhantomLance', the campaign was linked to threat group APT32 or OceanLotus, which is thought to have backed by the Vietnamese government.

Innocent people tend to put trust in things that are presented by someone they think they know.  And since these fake applications impersonate well-known apps from all over the world, the fraud is that more believable. If  something seems too good to be true, promised high returns on investments, or professional-looking dating profiles asking to transfer money or crypto assets and this is probably a scam.

Romance scams involve people being duped into sending money to criminals who go to great lengths to gain their trust and convince them that they are in a genuine relationship. They use language to manipulate, persuade and exploit so that requests for money do not raise alarm bells. These requests might be highly emotive, such as criminals claiming they need money for emergency medical care, or to pay for transport costs to visit the victim if they are overseas. Scammers will often build a relationship with their victims over time.

To avoid falling prey to such malicious apps, users should only install apps from trusted sources such as Google Play and Apple’s app store. 

How to Report Fraud

If you think you have been a victim of a romance scam, do not feel ashamed or embarrassed, you are not alone. Contact your bank immediately and in the United Kingdom report it to Action Fraud on 0300 123 2040.  

Sophos:       Coin Market Cap:          Computing:       Guardian:       Action Fraud

You Might Also Read:

Online Fraud Costs British Investors £63m:

 

« Microsoft’s Defensive Playbook
Identifying & Minimizing Security Vulnerabilities For Your Organization »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

SafeUM Communications

SafeUM Communications

SafeUM Secure Messenger is an encrypted secure communications protection mechanism for instant messaging.

Leibniz-Rechenzentrum (LRZ)

Leibniz-Rechenzentrum (LRZ)

The LRZ supports ground-breaking research and teaching in a wide range of scientific disciplines including information security and data protection.

SEPPmail

SEPPmail

SEPPmail is a patented e-mail encryption solution to secure your electronic communication.

Innovative Solutions (IS)

Innovative Solutions (IS)

Innovative Solutions is a specialized professional services company delivering Information Security products and solutions for Saudi Arabia and the Gulf region.

Lynx

Lynx

Lynx provides high added value services in the area of information systems security and ICT infrastructure building.

Indeed

Indeed

Indeed is a worldwide employment-related search engine for job listings covering job types in all industries, including cybersecurity.

SYSGO

SYSGO

SYSGO is the leading European provider of real-time operating systems for critical embedded applications in the Internet of Things (IoT).

Intel Capital

Intel Capital

Intel Capital, Intel's strategic investment organization, backs innovative technology startups and companies worldwide. We invest in a broad range of hardware, software, and services.

DeepSeas

DeepSeas

DeepSeas is the result of a merger between Security On-Demand (SOD) and the commercial Managed Threat Services (MTS) business of Booz Allen Hamilton.

Truesec

Truesec

TRUESEC has an exceptional mix of IT specialists. We are true experts in cyber security, advanced IT infrastructure and secure development.

Sunartek Labs

Sunartek Labs

Sunartek are equipped with expert resources and advanced technology to identify cyber threats and prevent any breach, bypassing the security network of your organization.

blueAllianceIT

blueAllianceIT

blueAlliance IT is an investment and growth platform that unites local MSP and IT companies around the nation, helping them to grow and operate competitively.

Radiance Technologies

Radiance Technologies

Radiance solutions provide technological advantage and operational superiority for our nation in the areas of intelligence, cyber and advanced weapon systems.

CryptoNext Security

CryptoNext Security

CryptoNext provides optimal end-to-end post-quantum cybersecurity remediation tools and solutions for IT/OT infrastructures & applications.

Applied Connective Technologies

Applied Connective Technologies

Applied Connective is one team for all your technology needs, from IT to phones, cyber security to physical security, audio/video and the infrastructure to support it.

Issue53

Issue53

Issue53 is a complete technology solution provider offering Managed IT services, Network Security, Cloud Computing, and Data Backup and Recovery.