shot-button
E-paper E-paper
Home > Technology News > Scammers are using SMS forwarding apps to con bank customers in India Experts

Scammers are using SMS forwarding apps to con bank customers in India: Experts

Updated on: 14 July,2022 05:03 PM IST  |  Mumbai
IANS |

Researchers from CloudSEK discovered and examined an Android app that pretends to be a bank customer service app

Scammers are using SMS forwarding apps to con bank customers in India: Experts

Image for representation: iStock

Cyber-security researchers on Thursday reported that they have spotted a new phishing campaign that is aimed at targeting banking consumers in India via SMS forwarding apps.

The phishing site collects victim's banking credentials and personal identifiable information (PII), post which an Android SMS forwarding malware is downloaded to their devices, according to AI cyber-security firm CloudSEK.

The research team discovered several domains with the same modus operandi and templates.

"The banks should also take responsibility in raising awareness about such scams and educate their customers to prevent monetary as well as reputation loss," said Anshuman Das, Cyber Threat Researcher at CloudSEK.

As part of the hackers' modus operandi, the victims first fill out sensitive banking information such as card number, CVV number, and expiry date, on the fake complaint portal.

After the banking information is exploited, a malicious customer support application gets downloaded to the victim's devices.

"No logos or names of the Indian banks have been used in these phishing websites, in order to avoid suspicion and detection. Moreover, the malicious customer support application is not hosted on the Google Play Store or any of the third-party application stores," said the researchers.

The malicious application is then used to send all the incoming SMS to the scammer's C2 (command and control) server.


Also read: Meta to update privacy settings to let users manage who sees their Facebook posts

"Even if a user's accounts are secured by multi-factor authentication, threat actors can still use the app to gather private information, conduct illicit activities on the users' banking accounts, and access their other accounts," the researchers warned.

Researchers from CloudSEK discovered and examined an Android app that pretends to be a bank customer service app. This application requests the user for two permissions on their device to receive SMS and send SMS.

The application's source code is revealed to be available on Github. The application does not have any obfuscation or evasion mechanisms that makes it difficult for antivirus or other solutions to detect it.

After the app has been installed on a victim's mobile phone, any SMS containing an OTP received on the device is redirected to the target phone controlled by the threat actor, the report mentioned.

"It is important to be extra cautious when installing new applications. Download apps from reputable app stores like the Google Play store and the App Store only. After installing any application, be careful while granting permissions," said Das.


This story has been sourced from a third party syndicated feed, agencies. Mid-day accepts no responsibility or liability for its dependability, trustworthiness, reliability and data of the text. Mid-day management/mid-day.com reserves the sole right to alter, delete or remove (without notice) the content in its absolute discretion for any reason whatsoever.


"Exciting news! Mid-day is now on WhatsApp Channels Subscribe today by clicking the link and stay updated with the latest news!" Click here!

Register for FREE
to continue reading !

This is not a paywall.
However, your registration helps us understand your preferences better and enables us to provide insightful and credible journalism for all our readers.

Mid-Day Web Stories

Mid-Day Web Stories

This website uses cookie or similar technologies, to enhance your browsing experience and provide personalised recommendations. By continuing to use our website, you agree to our Privacy Policy and Cookie Policy. OK