Fake Finance Apps Focus On Theft

Criminals have published hundreds of bogus banking, finance, and crypto-currency apps that steal your money. A team of researchers at Sophos say they have identified as many as 167 fake banking, trading and crypto-currency apps that criminals are using to steal money and financial information from unsuspecting users.

These fraudulent applications are aimed at exploiting the increased interest in trading apps, driven by the recent significant rise in the value of crypto-currencies.

These are also led by interest in low-cost or free stock trading driven by stories like that of the recent social-media driven speculation in GameStop stock where there has been an extraordinary rise in the share price of the ailing video games retailer GameStop amid a surge of bets by small investors. 

The researchers discovered the fake apps while investigating another bogus mobile trading app, which presented itself as one linked to Asian gold trading firm Goldenway Group. The cyber criminals operating these fake Android and iOS apps used counterfeit websites, social engineering techniques, and a fake iOS App Store download page to trick potential victims into believing that they were downloading and installing a legitimate app. In one case, scammers targeted a user through a dating website, where they tricked him into downloading a fake crypto-currency trading app. They avoided requests for face-to-face meetings, citing the pandemic, but encouraged the user to buy crypto-currency and transfer it into their wallet. When the victim tried to close the account or withdraw money, the scammers blocked account access.

Sophos said all the fraudulent apps it identified use a common server and similar designs, suggesting that a single group or entity is responsible.

Some apps offered a customer support chat option, and were observed to be using near-identical language when contacted.
During investigation of one of the apps Sophos encountered a server which was hosting hundreds of fake trading, banking, foreign exchange, and crypto currency apps. 

Among them were counterfeit apps impersonating major financial firms and popular crypto-currency trading platforms, including Barclays, Gemini, Bitwala, Kraken, Binance, BitcoinHK, Bittrex, BitFlyer, and TDBank. Each of these fake apps had a dedicated website tailored to the impersonated brand to better fool potential victims. "People trust the brands and people they know, or think they know, and the operators behind these fake trading and crypto-currency scams ruthlessly take advantage of that," said Jagadeesh Chandraiah, a senior threat researcher at Sophos.

To protect themselves against this kind of scam, Chandraiah advised mobile users to only install apps from trusted sources, like Apple and Google's official app stores. He also stressed the need for people to be cautious about websites or apps that claim unrealistically high returns on investments. "If something seems too good to be true - promised high returns on investments, or professional-looking dating profiles asking to transfer money or crypto assets - it's likely a scam," Chandraiah said.

Unverified and third-party mobile apps are a long-standing and growing security issue. Last year, researchers reported about two malware campaigns targeting Android users with apps that claimed to optimise smartphone performance but actually delivered malware. 

Also last year, researchers at Kaspersky uncovered a cyber espionage campaign that had used the Google Play Store to distribute malware for about four years, proving that even the official app stores aren't completely safe.
Dubbed 'PhantomLance', the campaign was linked to threat group APT32 or OceanLotus, which is thought to have backed by the Vietnamese government.

Innocent people tend to put trust in things that are presented by someone they think they know.  And since these fake applications impersonate well-known apps from all over the world, the fraud is that more believable. If  something seems too good to be true, promised high returns on investments, or professional-looking dating profiles asking to transfer money or crypto assets and this is probably a scam.

Romance scams involve people being duped into sending money to criminals who go to great lengths to gain their trust and convince them that they are in a genuine relationship. They use language to manipulate, persuade and exploit so that requests for money do not raise alarm bells. These requests might be highly emotive, such as criminals claiming they need money for emergency medical care, or to pay for transport costs to visit the victim if they are overseas. Scammers will often build a relationship with their victims over time.

To avoid falling prey to such malicious apps, users should only install apps from trusted sources such as Google Play and Apple’s app store. 

How to Report Fraud

If you think you have been a victim of a romance scam, do not feel ashamed or embarrassed, you are not alone. Contact your bank immediately and in the United Kingdom report it to Action Fraud on 0300 123 2040.  

Sophos:       Coin Market Cap:          Computing:       Guardian:       Action Fraud

You Might Also Read:

Online Fraud Costs British Investors £63m:

 

« Microsoft’s Defensive Playbook
Identifying & Minimizing Security Vulnerabilities For Your Organization »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cloudbric

Cloudbric

Cloudbric is a cloud-based web security service, offering award-winning WAF, DDoS protection, and SSL, all in a full-service package.

CISPA Helmholtz Center for Information Security

CISPA Helmholtz Center for Information Security

The CISPA Helmholtz Center for Information Security is a German national Big Science Institution within the Helmholtz Association. Our research encompasses all aspects of Information Security.

Array Networks

Array Networks

Array Networks, the network functions platform company, develops purpose-built systems for hosting virtual networking and security functions with guaranteed performance.

Wolfpack Information Risk

Wolfpack Information Risk

Wolfpack specialise in information and cyber threat management covering the full spectrum of prevention, detection, incident response and business resilience capabilities.

ReFoMa

ReFoMa

ReFoMa is a consultancy and advisory company with a focus on information Security.

Southwest Research Institute (SwRI)

Southwest Research Institute (SwRI)

Southwest Research Institute SwRI are R&D problem solvers providing independent services to government and industry clients. Areas of expertise include Cybersecurity, Intelligent Networks and IoT.

SOC Experts

SOC Experts

SOC Experts is a pioneer (we started SOC training well before people realized how big the domain was going to be) and the only institution to provide end-to-end training on Security Operations Centers

Red Sky Alliance

Red Sky Alliance

Red Sky Alliance (Wapack Labs Corp) is a cyber threat intelligence firm that delivers proprietary intelligence data, analysis and in-depth strategic reporting.

CyberUK

CyberUK

CYBERUK is the UK government’s flagship cyber security event and the authoritative event for the UK’s cyber security community.

comforte AG

comforte AG

comforte AG is a leading provider of data-centric security technology. Organizations worldwide rely on our tokenization and format-preserving encryption capabilities to secure personal, sensitive data

Recon InfoSec

Recon InfoSec

The Recon InfoSec team includes analysts, architects, engineers, intrusion specialists, penetration testers, and operations experts.

Nasuni

Nasuni

The Nasuni File Data Platform offers the protection, detection, and recovery of file shares from ransomware attacks or random disasters within minutes.

Moro Hub

Moro Hub

Moro Hub, a subsidiary of Digital DEWA, is a UAE-based digital data hub focused on digital transformation and operational services.

Darknone Global

Darknone Global

Darknone is a consortium of elite hackers and security leaders united by an unbridled passion for augmenting the security of the digital realm.

Catalyst Campus For Technology & Innovation

Catalyst Campus For Technology & Innovation

Catalyst Campus is a collaborative ecosystem to create community, spark innovation and stimulate business growth.

Two99

Two99

Two99 provide tailored excellence in the areas of E-Commerce, Marketing, Consulting, and Cyber Security.