Unmasking CheeryBlos and FakeTrade: Hidden Threats Lurking in Android Apps

  • Fiona Walker Fiona Walker
  • Aug 02, 2023
Unmasking CheeryBlos and FakeTrade: Hidden Threats Lurking in Android Apps

In recent times, malware threats targeting Android systems have been on the rise. Especially concerning are those created to steal vital information under the guise of images. Two malevolent software families, CheeryBlos and FakeTrade, have recently been detected. The alarming part is that one of these threats managed to infiltrate Google Play, the official app store for Android. This underscores the potential risk to the numerous users who trust this platform for their app needs.

These dangerous malware families were discovered by diligent researchers who observed their placement within various applications. One such app was SynthNet, which had been uploaded to Google Play. Evidently, unbeknownst to the unsuspecting users, the menacing software was in hiding within these apps. It was estimated that SynthNet had been downloaded approximately 1,000 times before its removal from Google Play, indicating a significant potential impact.

The cybersecurity experts deduced that both CheeryBlos and FakeTrade belong to the same threat actor. They reached this conclusion based on the similarities between the two malware families. They both use the same network infrastructure and identical certificates, denoting a likely common origin. These shared characteristics indicate a sophisticated threat actor who uses matching networks and certification to spread their perilous software.

The inconspicuous way these malware variants were smuggled into the apps outlines a potent threat to Android users. It’s concerning to imagine the amount and nature of the personal information that could have been stolen by these malevolent entities. Particularly worrying is the fact that these variants are crafted to extract data from photos and images stored on the victim's device, potentially accessing an even wider scope of information.

The objective of the malware threats named CheeryBlos and FakeTrade was to hijack valuable data from compromised Android devices. Particularly at risk were cryptocurrencies, potentially stored within mobile app wallets. These threats highlighted a dangerous evolution in hacker techniques, using innovative methods to trick their unwitting victims into handing over access to crucial personal data like financial credentials.

The malware operated in two main ways, both deviously hidden from the user's view. The first method saw a fake user interface overlaying crypto apps on the compromised device. Innocent users, inputting their credentials, unknowingly surrendered them to cyber attackers. The second method was a sinister rendition of the classic clipboard hijack. If a user copies a cryptocurrency wallet address, the malware swaps it with the address of the attacker. Unsuspecting victims, unless they double-checked, would end up transferring funds to the wrong hands.

The introduction of Optical Character Recognition (OCR) provided a third, innovative method for acquiring valuable information. Modern smartphones often feature OCR, enabling the device to interpret text on images or photos. Unfortunately, this useful feature can also be exploited. The malware used OCR to scan the device's photo gallery for relevant images and then sent acquired data back to the Command and Control (C2) center.

Although it appears that there were no specific regional targets for these cyberattacks, the majority of victims have been identified from Malaysia, Vietnam, Indonesia, the Philippines, Uganda, and Mexico. This international reach displays the extent of how widespread and global these threats have become, impacting users beyond borders and varying areas of the world.

In conclusion, as Android continues to maintain a key presence in the mobile space, it is crucial that users remain vigilant and proactive in protecting their digital property. Google Play's discovery of and response to this incident shows the importance of consistent security measures and the increasingly desperate need for effective solutions against such threats. Given the continuous evolution and sophistication of these malware families, everyone, from users to product developers, must step up their efforts to ensure data safety.


Latest Reviews

Latest Articles