{"id":91243,"date":"2022-12-23T17:46:10","date_gmt":"2022-12-23T12:16:10","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=91243"},"modified":"2023-06-17T16:37:40","modified_gmt":"2023-06-17T11:07:40","slug":"protect-yourself-from-vishing-attack","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/protect-yourself-from-vishing-attack\/","title":{"rendered":"Protect yourself from Vishing Attack!!"},"content":{"rendered":"<p><em>&#8220;Humans are the weakest link in cybersecurity.&#8221;<\/em> Data breaches worldwide prove this accurate, as human errors, lack of awareness, ignorance, or negligence cause these breaches. Social engineering is the attack that exploits human behavior and human nature, and there are different ways to perform this attack. Attackers often manipulate and convince users with valid authority, intimidate users, build relationships with them or try to create a perception. Users fall prey and tend to believe the object is scarce, there is an urgency, and immediate action is required.<\/p>\n<p>Vishing is social engineering attack and is a type of <a href=\"https:\/\/blogs.quickheal.com\/what-is-phishing-a-deep-dive-into-the-phishing-attack-mechanisms-with-tips\/\">phishing attack<\/a>. In this attack, the attacker uses psychological manipulation and calls the victim with the intent to steal information. They use this manipulation to trick victims into handing over sensitive information or performing some action on the attacker&#8217;s behalf. This attack is also called voice phishing.<\/p>\n<p>Vishing has been actively used in the recent past, and many unsuspecting users have ended up becoming the target of such attacks. In one common method for such attacks, the attacker asks the victim to install a screen-sharing application like AnyDesk or TeamViewer from Google Play Store from which they make the crime. One of them recently observed was trending on Twitter. In this case, the attackers target users complaining about bad service on Twitter. In this campaign, various applications are used, as illustrated in the following example:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91244 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/12\/1-300x92.png\" alt=\"\" width=\"762\" height=\"234\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/1-300x92.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/1-650x199.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/1-768x235.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/1-1536x471.png 1536w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/1-789x242.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/1.png 1762w\" sizes=\"(max-width: 762px) 100vw, 762px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig. 1 Attack Flow<\/strong><\/p>\n<p>It has been observed that many people prefer to share their displeasure with a deficiency in service or product in online forums rather than contacting the official customer support channels. Typically, the thought behind publicizing their dissatisfaction on public platforms is to highlight their issues, force corrective action, and expedite the grievance resolution. Some users post their contact details, like email or phone numbers, in their tweets for faster action \u2013 anticipating that the right officials would contact them to address their concerns. However, the users tend to miss them because these tweets are posted in the public domain, and everyone \u2013 including the mal-intentioned folks can see their details.<\/p>\n<p>Threat actors keep looking for such tweets. Most of the time, they get the contact details of the target from different social media accounts or by purchasing dumps from the dark web. They then call the user and try to convince them to download a contact support application presented as a tool to resolve their issue. They share the application via Email or WhatsApp as well. However, this application is an SMS Trojan that forwards incoming messages from the user\u2019s mobile to the attacker\u2019s number &amp; this methodology is used for stealing the OTP.<\/p>\n<p>As users tweet and share their contact details, they expect calls from \u201cofficial\u201d representatives. Attackers often take advantage of this situation in this campaign.<\/p>\n<p>Our team observed some tweets complaining about the services of IRCTC, PhonePe, SBI Bank, PNB Bank, Mobikwik, Meesho, CRED, Airtel India, Flipkart, etc.<\/p>\n<p>The following screenshots of such tweets illustrate the vishing attempts that have become prevalent in recent times:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91248 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/12\/5-300x164.png\" alt=\"\" width=\"759\" height=\"415\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/5-300x164.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/5-650x355.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/5-768x419.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/5-789x431.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/5.png 1488w\" sizes=\"(max-width: 759px) 100vw, 759px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig. 2 User Tweets<\/strong><\/p>\n<p>Some users have shared screenshots of WhatsApp messages in which the attacker sent the application to them via WhatsApp. File names used by these attackers for these applications are &#8211;<\/p>\n<p>\u201cOnline Complaint.apk,\u201d \u201cPNB_Support.apk\u201d, \u201cCustomer Support.apk,\u201d etc.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91245 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/12\/2-300x134.png\" alt=\"\" width=\"761\" height=\"340\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/2-300x134.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/2-650x290.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/2-768x343.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/2-1536x686.png 1536w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/2-789x352.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/2.png 1775w\" sizes=\"(max-width: 761px) 100vw, 761px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig. 3 Screenshots of WhatsApp message sent by the attacker<\/strong><\/p>\n<p>The attacker uses official logos of popular banks like ICICI bank and Punjab National Bank, finance institutions like Mahindra Finance and Bajaj finance, and some courier delivery service providers like Blue Dart Express and JNI Express to deceive unsuspecting users.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91246 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/12\/3-300x165.png\" alt=\"\" width=\"431\" height=\"237\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/3-300x165.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/3-650x358.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/3-768x423.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/3-789x434.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/3.png 1472w\" sizes=\"(max-width: 431px) 100vw, 431px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig.4 Icons Used by Malicious application.<\/strong><\/p>\n<p>When this application is launched, it asks permission to send and receive messages. Once the users grant these permissions, it sends these messages to the attacker. The application also asks the user to enable auto-start in settings.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91247 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/12\/4-300x126.png\" alt=\"\" width=\"758\" height=\"318\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/4-300x126.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/4-650x274.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/4-768x323.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/4-1536x647.png 1536w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/4-789x332.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/4.png 1776w\" sizes=\"(max-width: 758px) 100vw, 758px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig. 5 Application asking for SMS permissions<\/strong><\/p>\n<p>Fig.6 shows the code used to access the SMS messages; depending on conditions, this data is sent to a constant phone number from the code or number obtained from shared preference.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91249 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/12\/6-300x118.png\" alt=\"\" width=\"752\" height=\"296\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/6-300x118.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/6-650x257.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/6-768x303.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/6-1536x606.png 1536w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/6-789x311.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/6.png 1771w\" sizes=\"(max-width: 752px) 100vw, 752px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig.6 SMS access and sent.<\/strong><\/p>\n<p>Fig. 7 shows the code used to delete the SMS data, showing that the messages were sent from the user\u2019s mobile inbox to the attacker\u2019s number. This effectively erases the track of this fraudulent activity.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91250 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/12\/7-300x93.png\" alt=\"\" width=\"765\" height=\"237\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/7-300x93.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/7-650x201.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/7-768x237.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/7-789x244.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/7.png 1289w\" sizes=\"(max-width: 765px) 100vw, 765px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig.7 Code to delete sent SMS data<\/strong><\/p>\n<p>In this campaign, voice calls, i.e., the vishing technique, propagate these applications. Earlier, our investigations revealed a phishing page asking for credit and debit card credentials and distributing such applications. It was a fake page of Patanjali Yog gram registration. The application dropped by this site was also an SMS stealer Trojan.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91251 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/12\/8-300x201.png\" alt=\"\" width=\"517\" height=\"346\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/8-300x201.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/8-582x390.png 582w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/8-768x515.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/8-789x529.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/8.png 1219w\" sizes=\"(max-width: 517px) 100vw, 517px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig. 8 Patanjali phishing page<\/strong><\/p>\n<p>Attackers use different means to reach users. For example, they share SMS or WhatsApp messages about electricity bill updates or bank wallet KYC updates and ask to call the phone number mentioned in their ASAP. They try to create a fake sense of urgency in the message, which is one of the principles of social engineering. Following figure # 9 shows examples of such messages: &#8211;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91252 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/12\/9-300x153.png\" alt=\"\" width=\"356\" height=\"181\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/9-300x153.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/9-650x332.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/9-768x393.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/9-1536x786.png 1536w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/9-789x404.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/12\/9.png 1654w\" sizes=\"(max-width: 356px) 100vw, 356px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig. 9 messages shared by scammer about the electricity bill<\/strong><\/p>\n<p>Such applications are evolving, and attackers are adding new features in the latest versions to continue targeting users. Attackers are improvising day by day and using different techniques to attack. Everything we do in public online forums is susceptible to being misused by these attackers, and we need to be very cautious while using social media.<\/p>\n<p>Quick Heal detects all such applications with <strong>Android.SMForw.GEN50605<\/strong>.<\/p>\n<h2><strong>Tips to be safe:<\/strong><\/h2>\n<ul>\n<li>Do not post personal details like contact number, email Id, or address on public platforms.<\/li>\n<li>Caller IDs can be tampered with &#8211; so don&#8217;t trust them, as they can give a false sense of security.<\/li>\n<li>Don&#8217;t download any application sent\/shared from an unknown sender.<\/li>\n<li>If you receive a phone call from anyone requesting personal information or asking to download the application, don&#8217;t respond.<\/li>\n<li>Wherever possible, try to record the details of fraudsters and share them with your bank (whom they were trying to impersonate) so they can take action against them.<\/li>\n<li>Try to limit yourself to known apps from known developers and keep only those really required apps.<\/li>\n<li>Use a reliable mobile antivirus (like <a href=\"https:\/\/www.quickheal.co.in\/home-users\/quick-heal-total-security\/\">Quick Heal Total Security<\/a>) that can prevent fake, malicious apps, adware, etc., from getting installed on your phone.<\/li>\n<\/ul>\n<h2><strong>IOCs<\/strong><\/h2>\n<h3><strong>Package names:<\/strong><\/h3>\n<p>One.enix.smsforward<\/p>\n<p>com.myapplication.customersupport<\/p>\n<p>Com.helpdev.sbiquicksupport<\/p>\n<h3><strong>MD5s:<\/strong><\/h3>\n<p>A6658102CE9FC5CE78BE37186F30354A<\/p>\n<p>33132BFE2E46C010D05E589162F012F1<\/p>\n<p>743E185E03C05D9D2DEF00A157B8A03F<\/p>\n<p>E7ACE2B70410465953623BFED6F3CBEC<\/p>\n<p>3C4EE2DCF5B6B68A7C6C6E1AFB15EB4D<\/p>\n<p>26D58549A1280362911D4C97FD1C8C94<\/p>\n<p>6186AF5576D4E050CD335686296F1120<\/p>\n<p>B250D9216695CC97B03BAB5F787FB553<\/p>\n<p>4384E3B02CEE05630C08FF4AD536297C<\/p>\n<p>F89E929B7D4C8C0092975DA91040C7D9<\/p>\n<p>CC3F33F088EF7EEBAE63C92F8CF33DD7<\/p>\n<p>6889570124B98857A4F4413F377E5FAC<\/p>\n<p>4B5A7B6656ED90A2BC0E47C4773DF7C9<\/p>\n<p>C6DCEC98AE97150A26049BB697E3CDCF<\/p>\n<p>6864BDB5E33456C635EA3CF38826D3C8<\/p>\n<p>C5C4DD3B9C6599B718DD7A9BAC3FA615<\/p>\n<p>B12DD1A89ABB76741E5E8CD9AD6B6C09<\/p>\n<p>A54EB0072B66DC0D1DFBCE9D948E67C8<\/p>\n<p>0E41B1D777381AD71CFA7A89921013FE<\/p>\n<p>4B24778268E7250EAECC17B086252C49<\/p>\n<p>B72681BF5CDFE044EBF6F6AE35BEFD1E<\/p>\n<p>157731bb6f7163134df4274ca763340e<\/p>\n<p>2882f0acc188590ea0f8d6ef059a841b<\/p>\n<p>2ade1007f5181234bd15c931311dc2c4<\/p>\n<p>39645e267f41c0899910063497538571<\/p>\n<p>4c14d7bbcc303b4f4a010542d2b469d6<\/p>\n<p>608d4f8b1b5c169678ffc08283a37eda<\/p>\n<p>a74141a04a85ad9468e62b7cbf9bddfa<\/p>\n<p>c1bdd659c25ce5aaf78653d9c1d604f0<\/p>\n<p>D67985629353161c8c27ef24b51155ea<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Humans are the weakest link in cybersecurity.&#8221; Data breaches worldwide prove this accurate, as human errors, lack of awareness, ignorance, or negligence cause these breaches. Social engineering is the attack that exploits human behavior and human nature, and there are different ways to perform this attack. Attackers often manipulate and convince users with valid authority, [&hellip;]<\/p>\n","protected":false},"author":61,"featured_media":91261,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[55,164,354,303,1674,1747,60,304],"tags":[1840,1947,1965,1964,1950,1923,1963,1962,1949],"class_list":["post-91243","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-android","category-cyber-crime","category-mobile-security-2","category-phishing","category-scam-alert","category-scams","category-smartphone","category-social-engineering-2","tag-databreach","tag-fakecalls","tag-fraud-call","tag-fraud-sms","tag-phishingattack","tag-quickheal","tag-social-engineering-attack","tag-vishing-attack","tag-voicephishing"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91243"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=91243"}],"version-history":[{"count":14,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91243\/revisions"}],"predecessor-version":[{"id":91372,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91243\/revisions\/91372"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/91261"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=91243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=91243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=91243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}