{"id":91691,"date":"2023-05-08T16:58:38","date_gmt":"2023-05-08T11:28:38","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=91691"},"modified":"2023-06-17T16:22:32","modified_gmt":"2023-06-17T10:52:32","slug":"beware-fake-applications-are-disguised-as-legitimate-ones","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/beware-fake-applications-are-disguised-as-legitimate-ones\/","title":{"rendered":"BEWARE: Fake Applications are Disguised as Legitimate Ones"},"content":{"rendered":"<p>In the world of cybercrime, the tactics used by threat actors are constantly evolving, but upon close analysis of multiple instances, the modus operandi remains the same &#8211;\u00a0 i.e. exploitation of current events, trending news, government websites, and even legitimate applications of trusted organizations to dupe unsuspecting users.<\/p>\n<p>By using the names and logos of trusted applications, scammers can easily lure people into downloading and installing malicious fake apps on their devices.<\/p>\n<p>As cyber criminals are getting more creative and sophisticated in their social engineering techniques, it&#8217;s crucial for individuals and businesses to stay vigilant, and be aware of these potential threats. Not only that, it is also important to protect ourselves and our devices from these threat agents who are continuously looking for new avenues to target their victims and collect sensitive information for their own malicious purposes.<\/p>\n<p>At Quick Heal Security Labs we actively <a href=\"https:\/\/blogs.quickheal.com\/guide-new-age-cybersecurity-terms\/\">monitor Cybersecurity<\/a> news and other forums so that we stay abreast of the latest trends and threats. The intent is to ensure the complete digital safety &amp; security of our customers. This is why we have taken our time to go through the recent advisory published by the Indian Railway Catering and Tourism Corporation (IRCTC), about the IRCTC fake apps. Read on to understand more about the Fake Application menace as we analyze the threat in detail.<\/p>\n<p>The Fake IRCTC app portrays itself as the legitimate IRCTC app but is in reality a full-fledged spyware that spies on victims with ease.<\/p>\n<p>This fake app Spyware is able to perform the following actions:<\/p>\n<ul>\n<li>Steal Facebook and Google account credentials.<\/li>\n<li>Use accessibility to extract codes from Google Authenticator.<\/li>\n<li>Track GPS and network location.<\/li>\n<li>Use the Camera API to record and send videos.<\/li>\n<li>Gather Installed Applications\u2019 Information on the mobile device.<\/li>\n<li>Send all collected information to a C2 server, after which it can obfuscate to hide the host.<\/li>\n<\/ul>\n<h2>The Fake IRCTC App: How it Works<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-91709 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/05\/1-1-300x292.png\" alt=\"\" width=\"300\" height=\"292\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/05\/1-1-300x292.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/05\/1-1-45x45.png 45w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/05\/1-1-150x146.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/05\/1-1.png 307w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig\u00a001.\u00a0Fake\u00a0App\u00a0in\u00a0the\u00a0name\u00a0of\u00a0IRCTC.<\/em><\/p>\n<p>When we click on the application icon to launch, it continuously shows us this screen, as given below.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91710 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/05\/2-1-178x300.png\" alt=\"\" width=\"251\" height=\"423\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/05\/2-1-178x300.png 178w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/05\/2-1-231x390.png 231w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/05\/2-1-150x253.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/05\/2-1.png 324w\" sizes=\"(max-width: 251px) 100vw, 251px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig\u00a002.\u00a0Continuously\u00a0shows\u00a0this\u00a0screen.<\/em><\/p>\n<p>The fake app then tries to obtain the following permissions on a mobile device:-<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-91711 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/05\/3-1.png\" alt=\"\" width=\"296\" height=\"289\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/05\/3-1.png 296w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/05\/3-1-45x45.png 45w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/05\/3-1-150x146.png 150w\" sizes=\"(max-width: 296px) 100vw, 296px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig 03. Fake app trying to get permissions on the infected device<\/em><\/p>\n<p><em>Behind the scenes, this malware performs a\u00a0 number of malicious activities simultaneously,\u00a0 like stealing location and installed application data<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91715 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/05\/4-2-300x32.png\" alt=\"\" width=\"704\" height=\"75\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/05\/4-2-300x32.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/05\/4-2-650x70.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/05\/4-2-768x83.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/05\/4-2-789x85.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/05\/4-2-150x16.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/05\/4-2.png 1065w\" sizes=\"(max-width: 704px) 100vw, 704px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig 04. Taking Installed Applications Information.<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91713 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/05\/5-1-300x141.png\" alt=\"\" width=\"481\" height=\"226\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/05\/5-1-300x141.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/05\/5-1-150x71.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/05\/5-1.png 558w\" sizes=\"(max-width: 481px) 100vw, 481px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig\u00a005.\u00a0Taking\u00a0Location\u00a0Information<\/em><\/p>\n<p><em>One of the features of this spyware is the ability to steal Facebook credentials:-<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91714 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/05\/6-1-300x136.png\" alt=\"\" width=\"730\" height=\"331\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/05\/6-1-300x136.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/05\/6-1-650x295.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/05\/6-1-768x348.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/05\/6-1-789x358.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/05\/6-1-150x68.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/05\/6-1.png 1198w\" sizes=\"(max-width: 730px) 100vw, 730px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig\u00a006.\u00a0Social\u00a0Media\u00a0Credentials\u00a0Stealing.<\/em><\/p>\n<h2><strong>IRCTC ADVISORY:<\/strong><\/h2>\n<p><em>It has been reported that a malicious Android application (irctcconnect.apk) hosted on a phishing website (https:\/\/irctc.creditmobile.site) is being circulated over instant messaging platforms e.g., WhatsApp, Telegram, etc.<\/em><\/p>\n<p><em>This android app (APK file) is malicious and infects the mobile device. These fraudsters are sending phishing links at mass level and insisting users to download this android application, impersonating IRCTC officials to trick victims into revealing their sensitive net banking credentials like UPI details, credit\/debit card information etc.<\/em><\/p>\n<p><em>In view of this, you are advised that please do not install this application and keep yourself safe from such fraudsters.<\/em><\/p>\n<p><em>Always download IRCTC\u2019s authorized \u2018IRCTC Rail Connect\u2019 mobile app from Google Play Store or Apple Store.<\/em><\/p>\n<p><em>Please note that IRCTC does not call its users\/customers for their PIN, OTP, Password, Credit\/Debit Card Details, Net Banking password or UPI details.<\/em><\/p>\n<p><em>\u00a0Warm Regards,<\/em><br \/>\n<em>IRCTC<\/em><\/p>\n<h3><strong>Quick Heal Detection: <\/strong><\/h3>\n<p>Quick Heal is able to detect such malicious applications with variants of<strong> \u201cAndroid.SpyNote.GEN.&#8221;<\/strong><\/p>\n<p><strong>Indicator of Compromises (IOCs):<\/strong><\/p>\n<p>45c154af52c65087161b8d87e212435a<br \/>\nc01566f5feb7244ed4805e2855ebdc400<br \/>\nc77435e6e77152d24e86eb75e1f04d75<\/p>\n<p><em>It is recommended that all mobile users should install a trusted Anti Virus like <strong>\u201cQuick Heal Mobile Security for Android\u201d<\/strong> to mitigate such threats and stay protected. Our antivirus software restricts users from downloading malicious applications on their mobile devices.<\/em><\/p>\n<h2><strong>CONCLUSION:<\/strong><\/h2>\n<p>As illustrated above, malware authors lure users by using icons of legitimate applications. These SpyNote applications can cause much harm to the infected devices. Users should be aware of such ongoing cyber scams and refrain from downloading and installing applications from untrusted sources<em>.<\/em><\/p>\n<h3><strong>TIPS TO STAY SAFE:<\/strong><\/h3>\n<ul>\n<li>Download applications only from trusted sources like Google Play Store.<\/li>\n<li>Do not click on any links received through messages or any other social media platforms as they may be intentionally or inadvertently pointing to malicious sites.<\/li>\n<li>Read the pop-up messages you get from the Android system before accepting or allowing any new permissions.<\/li>\n<li>Be extremely cautious about what applications you download on your phone, as malware authors can easily spoof the original applications\u2019 names, icons, and developer details.<\/li>\n<li>For enhanced protection of your phone, always use a good antivirus like <a href=\"https:\/\/www.quickheal.co.in\/home-users\/quick-heal-total-security-for-android\">Quick Heal Mobile Security for Android<\/a>.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>In the world of cybercrime, the tactics used by threat actors are constantly evolving, but upon close analysis of multiple instances, the modus operandi remains the same &#8211;\u00a0 i.e. exploitation of current events, trending news, government websites, and even legitimate applications of trusted organizations to dupe unsuspecting users. By using the names and logos of [&hellip;]<\/p>\n","protected":false},"author":76,"featured_media":91700,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[55,1653,285,1611,164],"tags":[1953,431,277,901,1362,1957,1566,23,80,1234],"class_list":["post-91691","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-android","category-antivirus","category-applications","category-banking-trojan","category-cyber-crime","tag-malwareattack","tag-android","tag-android-apps","tag-cyberattack","tag-cybercrime","tag-cyberthreat","tag-fakeapp","tag-fraudulent-email","tag-quick-heal","tag-quick-heal-android-apps"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91691"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/76"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=91691"}],"version-history":[{"count":11,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91691\/revisions"}],"predecessor-version":[{"id":91739,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91691\/revisions\/91739"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/91700"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=91691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=91691"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=91691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}