Menu
Android malware targets South Korean online banking customers

Android malware targets South Korean online banking customers

Thousands have been infected by malware masquerading as a legitimate banking application, Cheetah Mobile said

Thousands of Android users in South Korea have been infected by online banking malware that looks very similar to the legitimate banking application, according to Cheetah Mobile, a Chinese mobile security company.

Thousands of Android users in South Korea have been infected by online banking malware that looks very similar to the legitimate banking application, according to Cheetah Mobile, a Chinese mobile security company.

Malicious software that swaps itself for legitimate online banking applications is striking users in South Korea, with thousands of devices infected in the last week, according to a Chinese mobile security company.

Cheetah Mobile, formerly known as Kingsoft Internet Security Software, wrote that the banking malware masquerades as a popular game or tool on third-party Android application markets.

Google checks Android applications in its Play store for malicious behavior, but third-party marketplaces are often rife with malicious applications. Security experts advise caution when using such sources for applications.

If the malicious application is installed, it scans for the official applications of South Korean banks including Nong Hyup, Shinhan, Kookmin, Woori, Hana, Busan and the Korean Federation of Community Credit Cooperatives, Cheetah Mobile wrote.

The malware then displays an alert that states that the online banking application needs to be updated. If the update is approved by a user, the malware deletes the legitimate application and replaces it with a similar looking but malicious copy. More than 2,000 variations of the malware have been detected by Cheetah.

It then asks for the password for the user's security certificate, which is required by the South Korean government in order to access many online services in the country. It also requests a bank account number, passwords and another security number issued to users when they opened an account, Cheetah Mobile wrote.

The malware then falsely alleges there isn't a data connection. When that message is closed by a user, the malware deletes itself from the devices having already stolen all of the information it needs, Cheetah Mobile wrote. The attackers use the information to apply for a new security certificate in order to access the victim's account.

Cheetah Mobile, which makes several security software programs and utilities for Android devices, said it detected between 3,000 to 6,000 infections per day between June 17 and Tuesday.

"This virus is very stubborn and can be hard to remove," it said.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Subscribe here for up-to-date channel news

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags securitymobile securitymalwarefraudCheetah Mobile

Featured

Slideshows

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

Revealed at a glitzy bash in Sydney at the Ivy Penthouse, the first StorageCraft Partner Awards locally saw the vendor honour its top-performing partners with ASI Solutions, SMBiT Pro, Webroot, ACA Pacific and Soft Solutions New Zealand taking home the top awards. Photos by Maria Stefina.

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards
Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

​Synnex and Lenovo hosted 18 resellers for an action-packed weekend adventure in RotoVegas, taking in white water rafting on the Kaituna River, as well as quad biking and dinner at Stratosfare​, overlooking Lake Rotorua at the top of Mount Ngongotaha​. Photos by Synnex.

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip
Show Comments