WAPDropper malware abuses Android devices for WAP fraud

WAPDropper malware abuses Android devices for WAP fraud

New WAPDropper malware signals users up to premium services supplied from telecoms from Thailand and Malaysia.

Security researchers have discovered a new breed of Android malware has been now dispersed in the wild, mostly targeting users situated in Southeast Asia.

Launched by security company Check Point, this malware is called WAPDropper and is now spread via malicious programs hosted on third-party program shops.

Check Point reported that when the malware infects an individual, it begins signing them up for top telephone numbers that charge big fees for a variety of kinds of services.

The final result is that contaminated users could get big phone bills every month till they unsubscribed in the top number or documented the problem for their cellular provider.

Check Point states based on the top phone numbers used within this strategy, the malware writers are probably established or cooperating with a person in Thailand or Malaysia.

“In this and similar strategies, both the hackers and the proprietors of this top rate numbers are co-operating or maybe the same group of individuals,” the firm said now at a report.

“It is only a numbers game: the further forecasts made utilizing the premium-rate services, the more revenue is created for people behind the providers. Everyone wins, except that the unlucky victims of this scam.”

In terms of the malware, Check Point states WAPDropper worked using two distinct modules. The first was called a dropper, although the second module was that the part that conducted the true WAP fraud.

The initial module has been the only one packed within the malicious programs, primarily to decrease the fingerprint and size of any malicious code within them. After the programs were installed and downloaded onto a device, this module could download the next element and begin defrauding victims.

But Check Point also wishes to increase an indication of alert about this specific bit of malware.

“Right now this malware falls a superior dialer, but in the long run, this payload can alter to fall whatever the attacker needs,” Aviran Hazum, Manager of Mobile Research at Test Point, informed.

“This kind of multi-function dropped,’ which further installs on a user’s telephone and downloads additional malware, has turned into a key cell infection trend we have observed in 2020.

All these dropper’ trojans represented almost half of mobile malware attacks between January and July 2020, together with joint infections from the hundreds of millions worldwide.

The Check Point staff additionally told that for now, they discovered the WAPDropper malware within programs called”af,””dolok,” an email program called”Mail ,” along with a children’s game called”Amazing Polar Fishing.” Users who installed some of those apps from beyond the Play Store are advised to eliminate them from their apparatus whenever possible.

Leave a Reply

Your email address will not be published.