Menu
Android malware targets South Korean online banking customers

Android malware targets South Korean online banking customers

Thousands have been infected by malware masquerading as a legitimate banking application, Cheetah Mobile said

Thousands of Android users in South Korea have been infected by online banking malware that looks very similar to the legitimate banking application, according to Cheetah Mobile, a Chinese mobile security company.

Thousands of Android users in South Korea have been infected by online banking malware that looks very similar to the legitimate banking application, according to Cheetah Mobile, a Chinese mobile security company.

Malicious software that swaps itself for legitimate online banking applications is striking users in South Korea, with thousands of devices infected in the last week, according to a Chinese mobile security company.

Cheetah Mobile, formerly known as Kingsoft Internet Security Software, wrote that the banking malware masquerades as a popular game or tool on third-party Android application markets.

Google checks Android applications in its Play store for malicious behavior, but third-party marketplaces are often rife with malicious applications. Security experts advise caution when using such sources for applications.

If the malicious application is installed, it scans for the official applications of South Korean banks including Nong Hyup, Shinhan, Kookmin, Woori, Hana, Busan and the Korean Federation of Community Credit Cooperatives, Cheetah Mobile wrote.

The malware then displays an alert that states that the online banking application needs to be updated. If the update is approved by a user, the malware deletes the legitimate application and replaces it with a similar looking but malicious copy. More than 2,000 variations of the malware have been detected by Cheetah.

It then asks for the password for the user's security certificate, which is required by the South Korean government in order to access many online services in the country. It also requests a bank account number, passwords and another security number issued to users when they opened an account, Cheetah Mobile wrote.

The malware then falsely alleges there isn't a data connection. When that message is closed by a user, the malware deletes itself from the devices having already stolen all of the information it needs, Cheetah Mobile wrote. The attackers use the information to apply for a new security certificate in order to access the victim's account.

Cheetah Mobile, which makes several security software programs and utilities for Android devices, said it detected between 3,000 to 6,000 infections per day between June 17 and Tuesday.

"This virus is very stubborn and can be hard to remove," it said.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Or
Error: Please check your email address.

Tags securityfraudmalwaremobile securityCheetah Mobile

Featured

Slideshows

Bumper channel crowd kicks off first After Hours of 2018

Bumper channel crowd kicks off first After Hours of 2018

After Hours made a welcome return to the channel social calendar with a bumper crowd of partners, distributors and vendors descending on The Jefferson in Auckland to kick-start 2018. Photos by Gino Demeer.

Bumper channel crowd kicks off first After Hours of 2018
Looking back at the top 15 M&A deals in NZ during 2017

Looking back at the top 15 M&A deals in NZ during 2017

In 2017, merger and acquisitions fever reached new heights in New Zealand, with a host of big name deals dominating the headlines. Reseller News recaps the most important transactions of the Kiwi channel during the past 12 months.

Looking back at the top 15 M&A deals in NZ during 2017
Kiwi channel closes 2017 with After Hours

Kiwi channel closes 2017 with After Hours

The channel in New Zealand came together to celebrate the close of 2017, as the final After Hours played out in front of a bumper Auckland crowd.

Kiwi channel closes 2017 with After Hours
Show Comments