• Skip to content
  • Skip to menu

DISC InfoSec blog

InfoSec and Compliance – With 20 years of blogging experience, DISC InfoSec blog is dedicated to providing trusted insights and practical solutions for professionals and organizations navigating the evolving cybersecurity landscape. From cutting-edge threats to compliance strategies, this blog is your reliable resource for staying informed and secure. Dive into the content, connect with the community, and elevate your InfoSec expertise! 

Rss 2.0

  • Home
  • About
  • Contact
  • InfoSec Books
  • InfoSec Threats
  • InfoSec webinars & blogs

Jul 31 2023

New Android Malware Uses Optical Character Recognition to Steal Login Credentials

Category: Malware — disc7 @ 1:57 pm
New Android Malware Uses Optical Character Recognition to Steal Login Credentials

New Android Malware Uses Optical Character Recognition to Steal Login Credentials

Besides employing various channels for distribution, these malicious apps, named “CherryBlos” and “FakeTrade,” have been discovered by cybersecurity researchers at Trend Micro to use OCR (Optical Character Recognition) techniques to extract sensitive data from pictures. The shared network infrastructure and certificates indicate the involvement of the same threat actors behind these new Android malware strains. The distribution channels used by these apps include social media, phishing sites, Google Play, and other Android app stores.

Android Malware Use OCR

In April 2023, CherryBlos malware emerged as an APK file that was found to be promoted on Telegram, Twitter, and YouTube as:-

  • AI tools
  • Coin miners

All the malicious APK files were downloaded from domain-matching websites. Here below, we have mentioned the malicious APK file names and matching domains:-

APK files:

  • GPTalk
  • Happy Miner
  • Robot999
  • SynthNet

Matching domain names:

  • chatgptc[.]io
  • happyminer[.]com
  • robot999[.]net
  • synthnet[.]ai

Moreover, the SynthNet app, a malicious version, was downloaded around 1,000 times onĀ Google PlayĀ before being reported and removed.

CherryBlos malware targets crypto wallet credentials and alters withdrawal addresses since it’s mainly designed to steal cryptocurrency wallet-related information.

The CherryBlos exploits accessibility service permissions to:-

  • Fetch config files
  • Auto-approve permissions
  • Block app termination

Besides stealing cryptocurrency-related data, CherryBlos also has an extraordinary feature that enables OCR for text extraction from images on the device.

Code to perform OCR on images (Source – Trend Micro)

When EnableImage is true in the config, CherryBlos reads media files, applying OCR for potential mnemonic recognition.

Despite the risk, people save recovery phrase photos on devices, enable malware extracts, and send data to threat actors.

Moreover, the malware also hijacks the Binance app clipboard, then alters the recipient address with the attacker’s, as this enables attackers to initiate illicit fund transfers stealthily.

Recommendations

Here below, we have mentioned all the recommendations offered by the security researchers at Trend Micro:-

  • Always download apps from the Google Play store and official app stores that are trusted. 
  • Make sure to keep your system, software, and AV tools updated with the available security patches and updates.
  • To block threats like these and other malware strains, make sure to install a robust and renowned AV solution.
  • Before allowing any permissions to apps, make sure to cross-check each permissions carefully.
  • Do not download any unknown attachments received via email.
  • Suspicious links could be dangerous, so, do not click on any suspicious links.

CISSP training course

InfoSec toolsĀ |Ā InfoSec servicesĀ |Ā InfoSec books

Tags: Steal Login Credentials

Comments (0)



  • Click below to Follow DISC InfoSec blog
      👇           👇           👇

    Follow DISC InfoSec blog

    Get new posts by email:
    Powered by follow.it
  • DISC InfoSec Services

    👉 Download a Virtual CISO (#vCISO) and Security Advisory Fact Sheet & Cybersecurity Cheat Sheet
  • Get a Cyber Aware Cheat Sheet now!
  • DISC InfoSec Store

    DISC online store for recommended InfoSec products

  • DISC InfoSec Online Services
    DISC InoSec Services
  • Download ISO27k Standards

    vCISO as a service



  • Search DISC InfoSec blog
  • Meta
    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
  • Blogroll
    • (ISC)2 blog
    • Aylward blog
    • CERT Podcast
    • Gartner
    • Get Safe Online
    • IdentityTheft.org.uk
    • Krebs on security
    • MicroSoftTechNet
    • Noticebored blog
    • SANS Internet Storm Center
    • Schneier blog
  • Archives
  • Categories
  • Tags
    API Security Business Chief Information Security Officer CISA CISO Cloud computing cloud security Computer security Credit card cyberwarfare dark web data breach data privacy data security facebook gdpr Google Hacking Identity Theft Information Security Information Security Management System International Organization for Standardization isms ISO/IEC 27001 iso 27001 ISO 27001 2022 iso 27001 certification iso 27002 Log4shell Malware Microsoft MITRE ATT&CK Open source pci dss Pegasus spyware phishing privacy Ransomware Protection Playbook Risk Assessment Risk management Security Security Risk Assessment Spyware United States vCISO
  • For an InfoSec and Compliance question
    Contact us

  • Best Sellers Books in Computer Security

    New Releases in Computer Security

top

Powered by WordPress and Stardust

Created by Tommaso Baldovino