A novel, very sophisticated mobile Trojan dubbed GoldPickaxe.
iOS that targets iOS users exclusively was discovered to collect facial recognition data, intercept SMS, and gather identity documents.
The Asia-Pacific region includes the majority of those impacted by this harmful activity.
On the other hand, two APAC countries that deserve particular consideration are Vietnam and Thailand.
The GoldPickaxe family, which comes in iOS and Android variants, is based on the GoldDigger Android Trojan and receives frequent modifications to improve its functionality and avoid detection.
Live attack simulation Webinar demonstrates various ways in which account takeover can happen and practices to protect your websites and APIs against ATO attacks.
Group-IB has linked the entire threat cluster to a single threat actor known as GoldFactory, which has created an advanced collection of mobile banking malware.
The traditional Android banking Trojan GoldDigger exploits Accessibility Service to provide hackers access to the device.
Another Android malware that increases GoldDigger's capability is called GoldDiggerPlus.
GoldDiggerPlus features an embedded Trojan called GoldKefu, which contains web fakes and allows real-time voice conversations with victims.
A Trojan called GoldPickaxe was created for the iOS and Android operating systems used to obtain and exfiltrate biometric data and personal information from victims.
Thai financial institutions extensively utilize facial recognition for login authentication and transaction verification.
Because of this, GoldPickaxe's facial recognition video capture and unique features give attackers the chance to access bank accounts without authorization.
Hackers are using their own Android smartphones to install banking apps, and they are exploiting the captured face scans to get over facial recognition security measures and gain unauthorized access to victims' accounts.
Cybercriminals pose as government officials in Thailand and convince victims to utilize LINE, one of the nation's most widely used chat services.
The LINE user needs to add another as a friend to initiate a chat.
Another technique is manipulating Apple devices using Mobile Device Management.
MDM is an all-inclusive and centralized approach to controlling and safeguarding mobile devices inside an organization, including tablets and smartphones.
Thus, a proactive and comprehensive strategy for cybersecurity must include user education and integrated current security techniques to proactively identify the introduction of new Trojans and alert end users.
Stay updated on Cybersecurity news, Whitepapers, and Infographics.
This Cyber News was published on gbhackers.com. Publication date: Mon, 19 Feb 2024 06:28:08 +0000