{"id":91977,"date":"2023-08-30T10:27:42","date_gmt":"2023-08-30T04:57:42","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=91977"},"modified":"2023-08-30T10:27:42","modified_gmt":"2023-08-30T04:57:42","slug":"battling-the-death-trap-of-malicious-loan-apps","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/battling-the-death-trap-of-malicious-loan-apps\/","title":{"rendered":"Battling the Death Trap of Malicious Loan Apps"},"content":{"rendered":"<p>In the age of instant finance at our fingertips, loan apps have reshaped how we access funds. But beneath the convenience lies a concerning trend \u2013 malicious apps that are being linked to tragic outcomes. In this blog, we will shed light on the alarming rise of these \u2018death-traps,\u2019 unravel the mechanics of these apps, and discuss solutions. We&#8217;ll also dive into Google Play&#8217;s new policies and the Government\u2019s measures in face of this threat.<\/p>\n<p><strong>Trap of the Loan App<\/strong><\/p>\n<p>A spate of tragic deaths have occurred in the last 2-3 years PAN India. The reason &#8211; seemingly genuine loan applications with sinister motives behind them. Victims comprise of those individuals who opted to take loans from such apps, but ended up committing suicide instead, driven by harassment, blackmail and abuse by operators of these loan apps.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-92016 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/MicrosoftTeams-image-300x225.png\" alt=\"\" width=\"479\" height=\"359\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/MicrosoftTeams-image-300x225.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/MicrosoftTeams-image-520x390.png 520w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/MicrosoftTeams-image-768x576.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/MicrosoftTeams-image-789x592.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/MicrosoftTeams-image-150x113.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/MicrosoftTeams-image.png 960w\" sizes=\"(max-width: 479px) 100vw, 479px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig.1 News articles about Loan application victims<\/strong><\/p>\n<p style=\"text-align: left;\">The modus operandi of these instant loan apps is to offer small loans without requiring much paperwork, but charge heavy interest rates and often resort to extortion through morphed photographs and cyber-bullying. These applications are observed to charge high interest rates and have extra fees hidden within the agreement. Many of these apps. make the users share unnecessary information including contact details, photographs, location and more.\u202f Subsequently, the operators behind these apps use these details to harass the victim by way of defamatory messages to their contacts with morphed photographs etc. Most of the time, the miscreants use inappropriate and provocative language to insult and demean the users. This unwarranted harassment leads to some users going into depression and attempting suicide in fear of public humiliation.<\/p>\n<p style=\"text-align: left;\">As per Tech Crunch report in August 2022,<\/p>\n<p>\u201c<em>Some are reportedly even taking their lives due to the immense pressure they get from these loan apps\u2019 unregulated agents. According to local news reports, nearly two dozen suicide cases owing to harassment coming from loan app operators have been reported online. <a href=\"https:\/\/docs.google.com\/spreadsheets\/d\/1MjwoFp8E6K52HIWg71qogngkB7joikhkUkfHFauBHEQ\/edit?pli=1#gid=0\">More than half a dozen<\/a> of them were reported specifically from Hyderabad<\/em>.\u201d<\/p>\n<p>Many users of these applications have reported their experiences and shared their concerns by commenting on Google Play Store. Some of these reviews read,<\/p>\n<p>\u201c<em>repayment time is less than the earlier mentioned, interest rates are high, less amount disbursed compared to applied loan, calling frequently for repayment, contacting relatives or other contacts<\/em>.\u201d<\/p>\n<p>Upon careful observation of these reviews, they appear very similar to comments of victims\u2019 while reporting of their loan-scam experiences.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91988 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/Fig.2-300x261.png\" alt=\"\" width=\"562\" height=\"489\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.2-300x261.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.2-448x390.png 448w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.2-768x668.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.2-1536x1337.png 1536w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.2-789x687.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.2-150x131.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.2.png 1742w\" sizes=\"(max-width: 562px) 100vw, 562px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig.2 Some reviews of reported applications<\/strong><\/p>\n<p>At Quick Heal Security Labs, we continuously analyze applications, especially from Google Play Store. Our aim is not only to detect and identify malware, but also to report their authenticity to secure Android users timely. As of late, we have reported nine such loan applications listed on Play Store to the Google Android team. These apps were being used by threat actors to trap victims into offering easy loans, with unprecedented dire consequences.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91989 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/Fig.3-300x118.png\" alt=\"\" width=\"554\" height=\"218\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.3-300x118.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.3-650x256.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.3-768x303.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.3-1536x606.png 1536w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.3-2048x807.png 2048w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.3-789x311.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.3-150x59.png 150w\" sizes=\"(max-width: 554px) 100vw, 554px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig.3 Reported Loan applications<\/strong><\/p>\n<p><strong>Steps taken by Google<\/strong><\/p>\n<p>Google has been proactive in removing such applications from their Play Store. In 2022, they reportedly removed more than 3500 such loan applications from Google Play Store. Following this, Google has also updated its policy regarding loan applications from time to time.<\/p>\n<p>According to Google\u2019s updated loan application policy, it is mandated that developers should: &#8211;<\/p>\n<ul>\n<li>Set the application category to \u2018Finance.\u2019<\/li>\n<li>Clearly mention the Minimum and Maximum period of repayment.<\/li>\n<li>Clearly mention Maximum Annual Percentage Rate which may include interest and other fees.<\/li>\n<li>Mention one example of the total cost of the loan, including the principal and all applicable fees<\/li>\n<li>Should give information about collection, use and sharing of personal and sensitive data in privacy policy.<\/li>\n<\/ul>\n<p>In addition to this, Google has also mentioned that they do not allow apps to promote personal loans which require repayment in full, in 60 days (about 2 months) or less, from the date the loan is issued (&#8220;short-term personal loans&#8221;)<\/p>\n<p>In a recent update, Google has further made major changes in its policy to address the issue of this loan death-trap. Personal loan applications are no longer allowed to access sensitive data, such as photos and contacts. To ensure that, Google has prohibited loan applications to use following permissions to access sensitive personal data: &#8211;<\/p>\n<ul>\n<li>Read external storage<\/li>\n<li>Read media images<\/li>\n<li>Read contacts<\/li>\n<li>Access fine location<\/li>\n<li>Read phone numbers<\/li>\n<li>Read media videos<\/li>\n<\/ul>\n<p><strong>Steps Taken by the Government<\/strong><\/p>\n<p>Reserve Bank of India (RBI) has also published Guidelines on Digital Lending in September 2022. In the guideline, RBI states that RE (Regulating Entities) should ensure that their DLA (Digital Lending Applications) should not access mobile phone resources like media, contact list, call logs or telephony functions.\u202f Further, it also states that only one-time access is allowed to camera, microphone and location for KYC (Know Your Customer) requirements.\u202f Here, the RE includes all the Banks and NBFCs (Non-Banking Financial Company) who offer digital lending services. DLA are personal loan applications that are web based or application based.<\/p>\n<p>In Feb 2023, the RBI asked the REs (Bank and NBFC) to share their applications. The list was then shared with the Finance ministry. The Ministry has directed that all applications which are not on this list should be Blocked.<\/p>\n<p><strong>Analysis of a Malicious Application:<\/strong><\/p>\n<p>Application name: Credit Wallet: Easy Loans<\/p>\n<p>Application link: <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.creditwallet.now\">Credit Wallet: Easy Loans \u2013 Apps on Google Play<\/a><\/p>\n<p>MD5: fbc71d55961197df0e9e4aa7f388c073<\/p>\n<p>Package name: com.creditwallet.now<\/p>\n<p>Fig. 4 shows permissions declared by the application in the manifest file of Android APK. Some of these permissions are unnecessary like, <em>android.permission.BLUETOOTH, android.permission.READ_CALL_LOG<\/em> etc.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91981 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/Fig.4-300x248.png\" alt=\"\" width=\"338\" height=\"279\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.4-300x248.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.4-472x390.png 472w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.4-150x124.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.4.png 491w\" sizes=\"(max-width: 338px) 100vw, 338px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig.4 Permissions declared by application<\/strong><\/p>\n<p>As per the new Google Play Policy, access to contacts, external storage and location is prohibited. However, the application tries different ways to get access to this sensitive information as explained below:<\/p>\n<p><strong>1] Contact access:<\/strong><\/p>\n<p>Illegal Loan applications ask for the victim\u2019s contact numbers, name and photographs of the contacts etc. This data is subsequently used to call or message relatives and friends of the victim in order to intimidate the user and extort money from them. Fig. 5 shows the code application used to get access to contact details. It is using runtime permission to get contact access: &#8211;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91982 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/Fig.5-300x90.png\" alt=\"\" width=\"762\" height=\"229\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.5-300x90.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.5-650x195.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.5-768x230.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.5-789x236.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.5-150x45.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.5.png 1415w\" sizes=\"(max-width: 762px) 100vw, 762px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig. 5 contact access<\/strong><\/p>\n<p>If it fails to get contact details by using the above method, it uses another option to get the contacts list as illustrated in Fig. 6 below: &#8211;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91983 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/Fig.6-300x92.png\" alt=\"\" width=\"395\" height=\"121\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.6-300x92.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.6-150x46.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.6.png 550w\" sizes=\"(max-width: 395px) 100vw, 395px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig.6 Contact access by uriMatcher<\/strong><\/p>\n<p><strong>2] External Storage access:<\/strong><\/p>\n<p>By acquiring access to external storage any application will get access to the user&#8217;s personal photos, videos, audios, documents etc. This data is sensitive and often ignored by many users. External storage data is highly misused by loan-scam operators. They take personal photos of victims; or their relatives in order to morph them and blackmail the victims.<\/p>\n<p>Fig. 7 shows code used by this application to access external storage: &#8211;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91984 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/Fig.7-300x104.png\" alt=\"\" width=\"765\" height=\"265\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.7-300x104.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.7-650x225.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.7-768x265.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.7-1536x531.png 1536w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.7-789x273.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.7-150x52.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.7.png 1568w\" sizes=\"(max-width: 765px) 100vw, 765px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig. 7 Accessing external storage<\/strong><\/p>\n<p><strong>3] Location access:<\/strong><\/p>\n<p>By tracking locations threat actors can get information about the places visited, and conclusions can be made about user\u2019s habits and preferences. It uses GPS data with network data to determine the location. As per the new Google Play policy, it is prohibited for loan apps to declare ACCESS_FINE_LOCATION, which allows apps to get exact and accurate geolocation.<\/p>\n<p>Fig.8 shows code used by the application to get location information: &#8211;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91985 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/Fig.8-300x151.png\" alt=\"\" width=\"659\" height=\"331\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.8-300x151.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.8-789x398.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.8-150x76.png 150w\" sizes=\"(max-width: 659px) 100vw, 659px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig. 8 Location access code<\/strong><\/p>\n<p>The sensitive PII (Personally Identifiable Information) collected by such apps is sent to a command-and-control server in the form of a json file.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91986 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/Fig.9-300x123.png\" alt=\"\" width=\"754\" height=\"309\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.9-300x123.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.9-650x266.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.9-768x314.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.9-1536x627.png 1536w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.9-789x322.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.9-150x61.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.9.png 1760w\" sizes=\"(max-width: 754px) 100vw, 754px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig. 9 code for information sharing<\/strong><\/p>\n<p>QuickHeal Security Labs is able to identify all such mal-intended applications with various Android.Spyloan detections.<\/p>\n<p><strong>IOCs:<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91996 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/Fig.10-300x116.png\" alt=\"\" width=\"419\" height=\"162\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.10-300x116.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.10-650x251.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.10-768x297.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.10-789x305.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.10-150x58.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/Fig.10.png 812w\" sizes=\"(max-width: 419px) 100vw, 419px\" \/><\/p>\n<p><strong>Tips to stay safe:<\/strong><\/p>\n<ul>\n<li>Try to avoid downloading applications from third party stores. Instead, install applications from official stores only.<\/li>\n<li>While installing the application from Google Play Store, pay close attention to the details such as developer name, description, permissions being asked by the app, as well as its user reviews.<\/li>\n<li>For loan applications, check the NBFC (Non-Banking Financial Company) name mentioned in description through a Google search of the name of the application, NBFC name etc.<\/li>\n<li>Avoid using loan applications from unknown banks, NBFCs etc. and stick to known banking apps only.<\/li>\n<\/ul>\n<p><strong>Conclusion<\/strong><\/p>\n<blockquote><p>The recent Google Play policy stands as a crucial step in safeguarding users from potential risks posed by loan apps. By prohibiting certain permissions, the policy addresses significant privacy concerns. This move highlights the importance of continuous vigilance and stringent regulations to ensure the safety and security of users in the digital realm. The responsibility also lies on the part of the digital user and loan-seeker. Staying informed and advocating for responsible app practices remains paramount in this evolving technological landscape.<\/p><\/blockquote>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the age of instant finance at our fingertips, loan apps have reshaped how we access funds. But beneath the convenience lies a concerning trend \u2013 malicious apps that are being linked to tragic outcomes. In this blog, we will shed light on the alarming rise of these \u2018death-traps,\u2019 unravel the mechanics of these apps, [&hellip;]<\/p>\n","protected":false},"author":61,"featured_media":92033,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[285,164,354,1675,1674,1747,304,293],"tags":[431,681,371,1362,674,1820,1999,1997,1010,1998],"class_list":["post-91977","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-applications","category-cyber-crime","category-mobile-security-2","category-online-frauds","category-scam-alert","category-scams","category-social-engineering-2","category-spam","tag-android","tag-cyber-fraud-attacks","tag-cyberbullying","tag-cybercrime","tag-google-apps","tag-googleplaystore","tag-instant-loan-apps","tag-loan","tag-scams","tag-spyloan"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91977"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=91977"}],"version-history":[{"count":16,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91977\/revisions"}],"predecessor-version":[{"id":92041,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91977\/revisions\/92041"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/92033"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=91977"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=91977"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=91977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}