July 30, 2023
2 mins read

New malware targeting Android users to steal sensitive data using OCR

The malicious apps are distributed through a variety of channels, including social media, phishing websites, and shopping apps on Google Play….reports Asian Lite News

Two new malware families targeting Android users have been discovered on Google Play, named CherryBlos and FakeTrade, which are designed to steal cryptocurrency credentials and funds or conduct scams using optical character recognition (OCR), a new report has said.

According to cybersecurity software company Trend Micro, both malware uses the same network infrastructure and certificates, indicating the same threat actors created them.

The malicious apps are distributed through a variety of channels, including social media, phishing websites, and shopping apps on Google Play.

CherryBlos malware was first seen spread in April 2023 in the form of an APK (Android package) file marketed on Telegram, Twitter, and YouTube as AI tools or cryptocurrency miners.

The names used for the malicious APKs are GPTalk, Happy Miner, Robot999, and SynthNet, according to the report.

The downloaded malware CherryBlos (AndroidOS_CherryBlos.GCL), named because of the unique string used in its hijacking framework, can steal cryptocurrency wallet-related credentials, and replace victims’ addresses while they make withdrawals.

In addition, a more interesting feature can be enabled, which uses OCR to remove text from photos and images.

“Once granted, CherryBlos will perform the following two tasks — Read pictures from the external storage and use OCR to extract text from these pictures, and upload the OCR results to the C&C server at regular intervals,” the researchers wrote.

Moreover, another campaign that employed several fraudulent money-earning apps — first uploaded to Google Play in 2021 — involved the FakeTrade malware.

Researchers discovered links to a Google Play campaign in which 31 scam apps known as “FakeTrade” used the same C2 network infrastructures and certifications as the CherryBlos apps, the report said.

These apps employ shopping themes or money-making entices to deceive users into watching commercials, committing to premium subscriptions, or topping up their in-app wallets while never allowing them to pay out the virtual prizes.

The applications have a similar interface and mostly target customers in Malaysia, Vietnam, Indonesia, the Philippines, Uganda, and Mexico, with the majority of them appearing on Google Play between 2021 and 2022.

ALSO READ: Kukis, Meitis urged to enter talks to end violence

Previous Story

UK accidentally sent military emails meant for US to Russian ally

Next Story

Apple’s new iOS 16.6 update fixes iPhone security flaws

Latest from Tech LITE

Army launches AI incubation centre in Bengaluru 

This centre is set to develop cutting-edge data-driven solutions, improving decision-making, operational efficiency, and readiness for AI-driven warfare within the Army….reports Asian Lite News Indian Army chief Gen Upendra Dwivedi on Wednesday

AI Powers India’s Green Push 

Most Indian executives (96 per cent) believe that AI can positively impact their sustainability goals….reports Asian Lite News About 98 per cent of Indian business leaders are planning to increase investment in

Indian Railways achieves 97% electrification 

Minister highlighted a significant increase in the pace of electrification, from approximately 1.42 km per day during 2004-14 to about 19.7 km per day in 2023-24…reports Asian Lite News Indian Railways is
Go toTop

Don't Miss

India among top 3 countries originating IoT malware

It identified unpatched, high-severity vulnerabilities in 75 per cent of

India experienced 7 lakh malware attacks in 2022

In 2021, the top three sectors affected by ransomware were