New Android Malware "FjordPhantom" Targets Banking Customers in Southeast Asia

https://icaro.icaromediagroup.com/system/images/photos/15911222/original/open-uri20231201-56-1xo3ord?1701463418
ICARO Media Group
News
01/12/2023 20h42

Cybersecurity researchers have recently unveiled a sophisticated Android malware known as FjordPhantom, which has been targeting users in Southeast Asian countries since early September 2023. The malware operates by combining app-based malware with social engineering techniques to defraud banking customers, according to an analysis published by Oslo-based mobile app security firm Promon.

FjordPhantom spreads primarily through messaging services, infiltrating recipients' devices via email, SMS, and messaging apps. The malware employs an attack chain that tricks users into downloading what appears to be a legitimate banking app but is, in fact, embedded with rogue components.

Upon installation, victims are subjected to a telephone-oriented attack delivery (TOAD) social engineering technique, where they are instructed to call a bogus call center. The perpetrators then provide step-by-step instructions for running the app, further deceiving the unsuspecting victims.

This particular Android malware stands out from other banking trojans due to its utilization of virtualization. By running malicious code in a container, FjordPhantom is able to evade Android's sandbox protections, which typically safeguard sensitive data. The virtualization solution employed by the malware allows different apps to be run on the same sandbox, granting the malware access to critical information without requiring root access.

Security researcher Benjamin Adolphi explained that the virtualization solution used by FjordPhantom can inject code into an application by first loading its own code into a new process, alongside the code of the hosted application. This method enables the malware to download a host app containing a malicious module and the virtualization element, subsequently launching the targeted bank's legitimate app within a virtual container.

In simpler terms, the illegitimate app loads the real banking app within a virtual environment while utilizing a hooking framework to modify the behavior of key APIs. This alteration allows FjordPhantom to programmatically capture sensitive information from the banking application's screen and dismiss any dialog boxes warning of malicious activity on the victims' devices.

Adolphi emphasized that FjordPhantom is designed in a modular manner to attack different banking apps, meaning it can adapt its tactics based on which specific banking app is embedded within the malware. This flexibility allows the malware to execute various attacks targeted at the specific banking apps it encounters.

As the prevalence of sophisticated malware continues to rise, users in Southeast Asia, particularly in countries like Indonesia, Thailand, and Vietnam, are advised to remain vigilant when downloading apps or engaging in financial transactions. It is crucial to verify the authenticity of banking apps by downloading them exclusively from reputable sources and to exercise caution when following instructions from unfamiliar call centers.

Mobile app security firms and cybersecurity experts are working tirelessly to mitigate the threat posed by FjordPhantom and similar malware. However, users must also prioritize their own security by employing robust security measures and regularly updating their devices with the latest security patches and antivirus software.

It is important to stay informed about new threats, protect personal information, and report any suspected fraudulent activities to the appropriate authorities to combat the ever-evolving landscape of cybersecurity threats.

The views expressed in this article do not reflect the opinion of ICARO, or any of its affiliates.

Related