Menu
Android malware targets South Korean online banking customers

Android malware targets South Korean online banking customers

Thousands have been infected by malware masquerading as a legitimate banking application, Cheetah Mobile said

Thousands of Android users in South Korea have been infected by online banking malware that looks very similar to the legitimate banking application, according to Cheetah Mobile, a Chinese mobile security company.

Thousands of Android users in South Korea have been infected by online banking malware that looks very similar to the legitimate banking application, according to Cheetah Mobile, a Chinese mobile security company.

Malicious software that swaps itself for legitimate online banking applications is striking users in South Korea, with thousands of devices infected in the last week, according to a Chinese mobile security company.

Cheetah Mobile, formerly known as Kingsoft Internet Security Software, wrote that the banking malware masquerades as a popular game or tool on third-party Android application markets.

Google checks Android applications in its Play store for malicious behavior, but third-party marketplaces are often rife with malicious applications. Security experts advise caution when using such sources for applications.

If the malicious application is installed, it scans for the official applications of South Korean banks including Nong Hyup, Shinhan, Kookmin, Woori, Hana, Busan and the Korean Federation of Community Credit Cooperatives, Cheetah Mobile wrote.

The malware then displays an alert that states that the online banking application needs to be updated. If the update is approved by a user, the malware deletes the legitimate application and replaces it with a similar looking but malicious copy. More than 2,000 variations of the malware have been detected by Cheetah.

It then asks for the password for the user's security certificate, which is required by the South Korean government in order to access many online services in the country. It also requests a bank account number, passwords and another security number issued to users when they opened an account, Cheetah Mobile wrote.

The malware then falsely alleges there isn't a data connection. When that message is closed by a user, the malware deletes itself from the devices having already stolen all of the information it needs, Cheetah Mobile wrote. The attackers use the information to apply for a new security certificate in order to access the victim's account.

Cheetah Mobile, which makes several security software programs and utilities for Android devices, said it detected between 3,000 to 6,000 infections per day between June 17 and Tuesday.

"This virus is very stubborn and can be hard to remove," it said.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Subscribe here for up-to-date channel news

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags securitymobile securitymalwarefraudCheetah Mobile

Featured

Slideshows

Tight lines as Hooked on Lenovo catches up at Great Barrier Island

Tight lines as Hooked on Lenovo catches up at Great Barrier Island

​Ingram Micro’s Hooked on Lenovo incentive programme recently rewarded 28 of New Zealand's top performing resellers with a full-on fishing trip at Great Barrier Island for the third year​ in a row.

Tight lines as Hooked on Lenovo catches up at Great Barrier Island
Inside the AWS Summit in Sydney

Inside the AWS Summit in Sydney

As the dust settles on the 2017 AWS Summit in Sydney, ARN looks back an action packed two-day event, covering global keynote presentations, 80 breakout sessions on the latest technology solutions, and channel focused tracks involving local cloud stories and insights.

Inside the AWS Summit in Sydney
Channel tees off on the North Shore as Ingram Micro hosts annual Cure Kids Charity golf day

Channel tees off on the North Shore as Ingram Micro hosts annual Cure Kids Charity golf day

Ingram Micro hosted its third annual Cure Kids Charity Golf Tournament at the North Shore Golf Club in Auckland. In total, 131 resellers, vendors and Ingram Micro suppliers enjoyed a round of golf consisting of challenges on each of the 18 sponsored holes, with Team Philips taking out the top honours.

Channel tees off on the North Shore as Ingram Micro hosts annual Cure Kids Charity golf day
Show Comments