{"id":21128,"date":"2023-02-01T05:20:54","date_gmt":"2023-02-01T13:20:54","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/02\/01\/news-14861\/"},"modified":"2023-02-01T05:20:54","modified_gmt":"2023-02-01T13:20:54","slug":"news-14861","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/02\/01\/news-14861\/","title":{"rendered":"Fraudulent \u201cCryptoRom\u201d trading apps sneak into Apple and Google app stores"},"content":{"rendered":"<p><strong>Credit to Author: Jagadeesh Chandraiah| Date: Wed, 01 Feb 2023 11:00:48 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p>&nbsp;<\/p>\n<p>CryptoRom is a romance-centered approach to financial fraud and a form of what is also known as &#8220;pig butchering&#8221; or \u201csha zhu pan\u201d (\u6740\u732a\u76d8, literally \u201cpig butchering plate\u201d). This type of fraud uses social engineering in combination with counterfeit financial applications and websites to ensnare victims and steal their money. For the past two years, we&#8217;ve <a href=\"https:\/\/news.sophos.com\/en-us\/2021\/05\/12\/fake-android-and-ios-apps-disguise-as-trading-and-cryptocurrency-apps\/\">researched<\/a> such scams, and have examined ways that their operators have evaded Apple\u2019s security checks by avoiding the app store and using ad-hoc methods to drop malicious applications onto victims&#8217; phones. Recently, we discovered CryptoRom apps that defeated Apple\u2019s and Google\u2019s app-store security review processes, making their way into the official stores. Victims of the scam alerted us to the applications and shared details of the criminal operations behind them. In the process of researching the applications, we found other apps and uncovered information about the organizations behind these scam operations.<\/p>\n<p>In both cases, victims were approached through dating applications (Facebook and Tinder). They were then asked to move their conversation to WhatsApp, where they were eventually lured into downloading the apps discussed in this report. While the highly developed profiles and backstories used to lure the victims into trusting the guidance provided by the criminals set the table for these scams, the ability to publish the apps used in these schemes in the official stores significantly contributed to their perceived credibility in the eyes of victims.<\/p>\n<p>Both Apple and Google have been notified about these apps. Apple\u2019s security team promptly removed them from that app store. Google recently removed the app we reported from the Play store as well.<\/p>\n<p><strong>Luring victims through dating apps<\/strong><\/p>\n<p>In the first case we investigated, the victim was based in Switzerland.\u00a0The target met his &#8220;potential partner,&#8221; a person or persons who used a profile of a woman purportedly based in London, through Facebook Dating. As seen in the other cases, the scammer&#8217;s Facebook profile was replete with photos seeming to show a lavish lifestyle, including photos of high-end restaurants, expensive shops and destinations, and near-perfect and professional-looking selfies. It is very likely that the profile contents were purchased from a third-party vendor or were stolen from the internet.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-01.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89470\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-01.png\" alt=\"A dozen small screen captures of photos sent by the persona showing &quot;her&quot; lifestyle (nice meals and wines, a day at the beach) and the persona &quot;herself&quot; -- a young-looking woman.\" width=\"640\" height=\"208\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-01.png 1255w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-01.png?resize=300,98 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-01.png?resize=768,250 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-01.png?resize=1024,333 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 1: The daily \u201clife\u201d of a nonexistent woman; some images were probably created by the scammers or by a paid provider, while others were likely stolen from elsewhere on the internet<\/em><\/p>\n<p>To maintain the appearance of being from London, the criminals behind the profile posted events from BBC News, such as Queen Elizabeth II&#8217;s\u00a0funeral, on the persona\u2019s Facebook timeline. The persona also &#8220;liked&#8221; and followed organizations that indicated interest in the BBC and well-known Western companies.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-02.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89471\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-02.png\" alt=\"A screen showing the persona's check-ins (Switzerland) and likes (BBC News, BMW, Cisco, Denner). These are used to give the persona credibility and enhance the larger social-engineering effort.\" width=\"640\" height=\"334\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-02.png 1600w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-02.png?resize=300,157 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-02.png?resize=768,401 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-02.png?resize=1024,535 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-02.png?resize=1536,803 1536w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 2: Check-ins and likes in the persona\u2019s profile helped the scammers build credibility for their creation<\/em><\/p>\n<p>After establishing a rapport, the criminals behind the profile told the victim that \u201cher\u201d uncle worked for a financial analysis firm, and invited the victim to do cryptocurrency trading together. At this point the scammers sent the victim a link to the fake application in the Apple app store. They instructed the victim in how to start &#8220;investing&#8221; with the application, telling them to transfer money to the Binance crypto exchange and then from Binance to the fake application.<\/p>\n<p>Initially, the victim was able to withdraw small amounts of cryptocurrency. But later, when the victim wanted to withdraw larger amounts, the account got locked and was told through a \u201ccustomer support\u201d chat in the application to pay a 20% fee (as shown in Figure 3) to access the cryptocurrency.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-03.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89472\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-03.png\" alt=\"A screen capture, lightly redacted by Sophos, showing what the victim sees at the blow-off for the CyptoRom scam. It reads: &quot;Hello, dear user, your ID card information has been verified. You also need your own account wallet to deposit USDT with 20% of the account balance (deposit USDT). The system will be suitable for all your account information. After the completion, the manual customer service will handle the temporary account lock release for you.&quot;\" width=\"414\" height=\"288\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-03.png 414w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-03.png?resize=300,209 300w\" sizes=\"auto, (max-width: 414px) 100vw, 414px\" \/><\/a><\/p>\n<p><em>Figure 3: Once trust in the fake application has been established, the victim\u2019s ability to withdraw money is suddenly \u201clocked\u201d<\/em><\/p>\n<p>The second victim followed a similar path, with the difference that initial contact was through Tinder. The scammer asked to move the conversation to WhatsApp, and then prompted the victim to download a different fake app from the iOS App Store. The victim caught onto the scam, but only after losing $4,000 USD.<\/p>\n<p><strong>Fake Apps in Apple App Store<\/strong><\/p>\n<p>Previously, iOS apps we\u2019ve seen associated with CryptoRom \/ pig butchering scams were deployed from outside the official Apple App Store via ad hoc distribution services. In order to get victims to install them, the criminals behind the scams\u00a0had to use social engineering\u2014 they had to convince the victims to install a configuration profile to enable app installation, a process that could potentially spook many targets. But in cases we\u2019ve investigated recently, applications used by the scammers were successfully placed into the Apple App Store, greatly reducing the amount of social engineering required to get the application onto victims&#8217; devices.<\/p>\n<p>The first of these applications appeared on first inspection to have no connection to cryptocurrency; called &#8220;Ace Pro,&#8221; the app was described in its app-store page as a QR code-checking application.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-04.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89473\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-04.png\" alt=\"A screen capture from Apple's app store, showing the Ace Pro app on offer (since removed).\" width=\"640\" height=\"477\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-04.png 1502w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-04.png?resize=300,224 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-04.png?resize=768,573 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-04.png?resize=1024,764 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 4: The app-store download page for Ace Pro, since removed <\/em><\/p>\n<p>The machine translation of the text (from Slovak):<\/p>\n<pre>\"Ace Pro\" per application, which converts QR code information of fast driving through   driving information. It's simple to upload and easy to use. It can transform your   train information very well, allowing you to quickly pass through the ride. Save time...\"<\/pre>\n<p>The privacy policy for the application also describes it as a &#8220;QR Check&#8221; application.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-05.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89474\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-05.png\" alt=\"The &quot;privacy policy&quot; for the app, reading: Cynthia St-Pierre built the QR Check app as a Free app. This SERVICE is provided by Cynthia St-Pierre at no cost and is intended for use as-is. This page is used to inform visitors regarding my policies with the collection, use, and disclosure of Personal Information if anyone decided to use my Service.&quot;\" width=\"640\" height=\"96\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-05.png 1584w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-05.png?resize=300,45 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-05.png?resize=768,115 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-05.png?resize=1024,154 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-05.png?resize=1536,231 1536w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 5: The Ace Pro privacy policy<\/em><\/p>\n<p>The second CryptoRom application we discovered in Apple\u2019s app store was called \u201cMBM_BitScan,\u201d described in the store listing as a real-time data tracker for cryptocurrencies. But it also has a fake cryptotrading interface. One victim lost around $4000 to this fake application.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-06.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89475\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-06.png\" alt=\"The MBM_BitScan app as seen on Apple's store before the app was removed. There are multiple iPhone screenshots showing the app's &quot;trading&quot; interface and setting screens.\" width=\"640\" height=\"499\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-06.png 1036w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-06.png?resize=300,234 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-06.png?resize=768,598 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-06.png?resize=1024,798 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 6: The app-store download page for MBM_BitScan, since removed<\/em><\/p>\n<p>Both of these applications managed to get past the Apple App Store review process. All applications that are installed via the Apple App Store <a href=\"https:\/\/developer.apple.com\/support\/code-signing\/\">must be signed by the developer using a certificate provided by Apple<\/a>, and must go through a stringent review process to verify that they follow the App Store <a href=\"https:\/\/developer.apple.com\/app-store\/review\/guidelines\/\">guidelines.<\/a><\/p>\n<p>If criminals can get past these checks, they have the potential to reach millions of devices. This is what makes it more dangerous for CryptoRom victims, as most of those targets are more likely to trust the source if it comes from the official Apple App Store.<\/p>\n<h3><strong>Evading App Store Review<\/strong><\/h3>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/figure-07.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89484\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/figure-07.png\" alt=\"A chart visually recapping the subversion of the app-approval process, which is described below in text.\" width=\"640\" height=\"360\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/figure-07.png 1280w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/figure-07.png?resize=300,169 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/figure-07.png?resize=768,432 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/figure-07.png?resize=1024,576 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 7: How fraudulent applications likely evaded the Apple review process.<\/em><\/p>\n<p>Both the apps we found used remote content to provide their malicious functionality\u2014content that was likely concealed until after App Store review was complete.<\/p>\n<p>In the case of the Ace Pro app, the malicious developers inserted code related to QR checking and other iOS app library code in the app to make it appear legitimate to reviewers.\u00a0 But when the app is launched, it sends a request to an Asian-registered domain (rest[.]apizza[.]net), which responds with content from another host (acedealex[.]xyz\/wap). It is this response that delivers the fake CryptoRom trading interface. It is likely that the criminals used a legitimate-looking site for responses at the time of the app review, switching to the CryptoRom URL later.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-08.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89476\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-08.png\" alt=\"Split-screen image showing analysis of the specific web request from the Ace Pro app. On the left, the call to rest-dot-apizza-dot-net is visible. On the right, the returned data includes a link to a page on acedealex-dot-sys.\" width=\"640\" height=\"190\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-08.png 1372w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-08.png?resize=300,89 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-08.png?resize=768,228 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-08.png?resize=1024,305 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 8: <\/em><em>The captured web request and response from the Ace Pro app<\/em><\/p>\n<p>The MBM_BitScan app uses a similar approach. On execution, it sends a JSON request to a \u00a0command-and-control (C2) server hosted on Amazon Web Services, and gets a response from a domain called flyerbit8(.)com \u2014a domain crafted to look like that of legitimate Japanese bitcoin vendor <a href=\"https:\/\/bitflyer.com\/en-eu\/\">bitFlyer<\/a>:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-09.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89477\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-09.png\" alt=\"Split-screen image showing analysis of the specific web request from the MBM_BitScan app. On the left, the call to the &quot;flyerbit&quot; AWS instance is visible; on the right, the returned data includes a link to flyerbit8-dot-com-whack-home.\" width=\"640\" height=\"271\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-09.png 1458w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-09.png?resize=300,127 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-09.png?resize=768,326 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-09.png?resize=1024,434 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 9: <\/em><em>The web request made by the MBM_BitScan app, and the response delivering the JSON package\u00a0 containing the URL of the malicious website serving up the fake trading app<\/em><\/p>\n<p>This review evasion technique, which is connected to click-fraud malware, has been seen previously by other researchers in fake iOS applications dating back to 2019 .<\/p>\n<h3><strong>Fake Crypto Interfaces<\/strong><\/h3>\n<p>The remote content displayed within these applications is similar to other CryptoRom and pig butchering scam applications we\u2019ve seen. Both have a working-but-fake trading interface with the purported ability to deposit and withdraw currency, as well as a built-in customer service function. But all the deposits go into the crooks\u2019 pockets rather than an actual trading account.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-10.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89478\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-10.png\" alt=\"Multiple screen captures showing the Ace Pro interface, including account-management options and market pricing for various cryptocurrencies.\" width=\"640\" height=\"367\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-10.png 1600w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-10.png?resize=300,172 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-10.png?resize=768,441 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-10.png?resize=1024,588 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-10.png?resize=1536,881 1536w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 10: <\/em><em>The trading interface in the Ace Pro app<\/em><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-11.jpeg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89479\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-11.jpeg\" alt=\"A screen capture from a phone showing the &quot;buy crypto&quot; option on MBM_BitScan, including various numbers indicating market movement among BitCoin, Ethereum, and other currencies.\" width=\"638\" height=\"1103\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-11.jpeg 638w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-11.jpeg?resize=174,300 174w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-11.jpeg?resize=592,1024 592w\" sizes=\"auto, (max-width: 638px) 100vw, 638px\" \/><\/a><\/p>\n<p><em>Figure 11: The MBM_BitScan<\/em><em> fake-application interface, with an option to buy crypto<\/em><\/p>\n<p>Because these trading interfaces are loaded at runtime, and because the entirety of the malicious content of the applications resides on the web server and not in application code, it is challenging for app stores to review and find these fake applications. \u00a0They\u2019re difficult to identify as fraudulent by reviewers by just viewing the code. And since they will likely only be used by people targeted by the scams, they will only get reported by targeted users who are familiar with legitimate versions of the applications and have an understanding of cryptocurrency. \u00a0Because of these factors, these types of fake applications will continue to pose a significant challenge to Apple\u2019s app security reviewers.<\/p>\n<p><strong>Google Play Store application <\/strong><\/p>\n<p>The Google Play Store version of MBM_BitScan has a different vendor name and different title than that of the Apple version. However, it communicates with the same C2 as the iOS version of the app, and likewise accesses the domain that hosts the fake trading interface via JSON. It receives flyerbit8&lt;dot&gt;com, which as noted above resembles the legitimate Japanese crypto firm bitFlyer. Everything else is handled in the web interface.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-12.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89480\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-12.png\" alt=\"Screen captures from an Android phone showing the &quot;BitScan&quot; interface and the installation page on Google's app store.\" width=\"640\" height=\"603\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-12.png 741w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-12.png?resize=300,283 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 12: The MBM_BitScan app as seen on Google Play Store<\/em><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-12a.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89483\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-12a.png\" alt=\"A code snippet showing the JSON data retrieved via an AWS-based URL.\" width=\"640\" height=\"88\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-12a.png 1203w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-12a.png?resize=300,41 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-12a.png?resize=768,105 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-12a.png?resize=1024,140 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 13: The Android version of the MBM_BitScan app\u2019s getUrl method, with an AWS-based URL that fetches the JSON data containing the CryptoRom interface<\/em><\/p>\n<p><strong>The actors behind CryptoRom rings<\/strong><\/p>\n<p>CryptoRom and other forms of \u201cpig butchering\u201d <a href=\"https:\/\/m-fx361-com.translate.goog\/news\/2020\/1210\/7315273.html?_x_tr_sl=zh-CN&amp;_x_tr_tl=en&amp;_x_tr_hl=en&amp;_x_tr_pto=sc\">initially targeted<\/a> people in China and Taiwan. Early scams focused on online gambling with insider information, using similar tactics to CryptoRom. Over the course of the COVID-19 pandemic, the scams expanded globally and evolved into fraudulent foreign exchange and cryptocurrency trading. We are tracking this threat actor as the \u201cShaZhuPan\u201d group.<\/p>\n<p>When Chinese authorities started cracking down on these scams and prosecuted some perpetrators, some of the gangs behind them fled to smaller southeast Asian countries, including <a href=\"https:\/\/www.latimes.com\/world-nation\/story\/2022-11-01\/i-was-a-slave-up-to-100-000-held-captive-by-chinese-cyber-criminals-in-cambodia\">Cambodia<\/a>, where they now <a href=\"https:\/\/www.vice.com\/en\/article\/n7zb5d\/pig-butchering-scam-cambodia-trafficking\">operate<\/a> in special economic zones (<a href=\"https:\/\/m-fx361-com.translate.goog\/news\/2020\/1210\/7315273.html?_x_tr_sl=zh-CN&amp;_x_tr_tl=en&amp;_x_tr_hl=en&amp;_x_tr_pto=sc\">SEZ<\/a>).<\/p>\n<p>According to <a href=\"http:\/\/www.xinhuanet.com\/legal\/2020-08\/03\/c_1126316375.htm\">reports<\/a> by Chinese law enforcement organizations who <a href=\"https:\/\/doi.org\/10.1080\/15564886.2022.2051109\">targeted<\/a> these operations in China, CryptoRom groups follow a business structure that mimics a corporate organizational model. At the top is a head office, which does supervision and money laundering. The head office sub-contracts scam operations to affiliate organizations. These franchise operations, also called agents, have their own division of labor:<\/p>\n<ul>\n<li>The &#8220;front desk&#8221; team handles logistics, human trafficking (more on this below) of new workers, and site management.<\/li>\n<li>The tech team handles websites and applications.<\/li>\n<li>The finance team handles the local finance operations; profits are divided 40:60 between the head office and franchise.<\/li>\n<li>Keyboarders are at the bottom of the crime chain and are the ones that do the majority of interaction with the victims.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-13.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89481\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-13.png\" alt=\"A flow chart showing in a visual format the information given in the bullet list above.\" width=\"640\" height=\"427\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-13.png 847w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-13.png?resize=300,200 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-13.png?resize=768,512 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 14: The org chart of a typical pig-butchering group<\/em><\/p>\n<p>During Covid-19, many <a href=\"https:\/\/www.vice.com\/en\/article\/n7zb5d\/pig-butchering-scam-cambodia-trafficking\">underdeveloped<\/a> countries did not have jobs or sufficient social benefits to support those affected by economic disruptions. This pushed many young people into taking job offers in other countries\u2019 special economic zones that promised high pay. Many of these were fraudulent job offers tied to pig-butchering rings; when workers <a href=\"https:\/\/www.financialexpress.com\/india-news\/held-captive-forced-to-commit-cyber-fraud-over-100-indians-rescued-from-fake-job-scam-in-myanmar-cambodia\/2703912\/\">arrive<\/a><u>d<\/u>, they were transported to CryptoRom centers and had their passports confiscated.<\/p>\n<p>Often, keyboarders are these trafficked victims, brought from countries like China, Malaysia and <a href=\"https:\/\/www.financialexpress.com\/india-news\/held-captive-forced-to-commit-cyber-fraud-over-100-indians-rescued-from-fake-job-scam-in-myanmar-cambodia\/2703912\/\">India<\/a> with the promise of better-paid jobs. They are trained with pre-written scripts with instructions on how to interact, what to say to their victims, and how to bring them into investing. If they want to leave or do not follow the script, they are reportedly subjected to <a href=\"https:\/\/www.vice.com\/en\/article\/n7zb5d\/pig-butchering-scam-cambodia-trafficking\">violence<\/a>.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-14.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89482\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-14.png\" alt=\"A page of scripted dialogue from a handbook for keyboarders working a CryptoRom scam. The text in the image is auto-translated and describes the &quot;cut-in method&quot; guiding the conversation to putting money into the scam while giving assurances that the keyboarder is actually the scam &quot;persona&quot; living an exciting and wealthy life.\" width=\"640\" height=\"818\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-14.png 715w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/figure-14.png?resize=235,300 235w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 15: <\/em><em>Translated training manual posted on Reddit by a former keyboarder<\/em><\/p>\n<p><strong>Why do victims fall for this?<\/strong><\/p>\n<p>One of the questions that comes to everyone&#8217;s mind when reading these articles about people losing money to CryptoRom is, &#8220;Why do they do this?&#8221; Why do victims put so much money into these scams in spite of the many red flags along the way \u2014 especially when they have not even met the person face to face?<\/p>\n<p>It&#8217;s easy to quickly judge them, but it&#8217;s wrong to dismiss the victims of these scams without understanding the circumstances that led them to fall for the schemes. After discussions with a number of victims and reviewing public postings by others, we identified some of the potential reasons they overlooked the threats. Many of the victims (both men and women) were well-educated; some even had PhDs. They were swayed by the persuasion techniques used in these scams:<\/p>\n<ul>\n<li>The length of engagement \u2014 the scammers can spend several months gaining the trust of the victim, chatting with them, greeting them, and sending images of typical day-to-day life. The victims may be less likely to research elements of the scam because of the persistence of the contact with the scammers.<\/li>\n<li>The proof of an initial withdrawal \u2014 the victims were convinced by the fact that they were allowed by the scam to withdraw money from initial transactions. This tactic is a well-worn method also used by traditional Ponzi schemes to make the confidence scam seem more authentic.<\/li>\n<li>Mirroring of transactions \u2013 The scammers use screen shots of the fake app to show that they are doing the same thing that they are asking the victim to do, and show the (fake) profits that they are making. They ask the victim to do the same transactions, while convincing them to increase their deposit into the fake marketplace.<\/li>\n<li>Fake lending &#8211; When victims have to pay fake tax, as a final blow, they pretend to pay half the tax bill for the victim and ask the victim to bring the other half.<\/li>\n<\/ul>\n<p>There are other contributing factors making the victims potentially more open to persuasion:<\/p>\n<ul>\n<li>Emotional vulnerability \u2014 Most of them were vulnerable to emotional manipulation. In many cases, the victims were men or women who had experienced some sort of major life change. Some had been unsuccessful in the dating pool, were recently widowed, or had experienced a major illness.<\/li>\n<li>The rise of app-based finance \u2013 \u00a0\u00a0\u00a0The emergence of \u201cFinTech\u201d (finance technology) companies without physical branches over the past few years has made it more difficult to spot the fake ones&#8211; especially when they\u2019re presented by someone trusted.<\/li>\n<li>Platform trust &#8211; Finally, and perhaps most importantly, victims trust Apple and Google, which claim to verify and check all the applications distributed by their app stores.<\/li>\n<\/ul>\n<p><strong>Removing a CryptoRom App<\/strong><\/p>\n<p>If you installed a CryptoRom app through any app store, please just delete the application. On Apple devices:<\/p>\n<ol>\n<li style=\"list-style-type: none\">\n<ol>\n<li>Touch and hold\u00a0the app\u00a0until it jiggles.<\/li>\n<li>Then tap the delete button (the X) in the upper-left corner of the app to delete it. If you see a message that says, &#8220;Deleting this app will also delete its data,&#8221; tap Delete.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>If you installed the profile from outside the app store using a profile, these steps are recommended by Apple&#8217;s <a href=\"https:\/\/support.apple.com\/en-gb\/HT205347\">documentation:<\/a><\/p>\n<ol>\n<li>If the app has a configuration profile, delete it if you installed it\n<ul>\n<li>Go to Settings &gt; General &gt;\u00a0Profiles\u00a0or Profiles &amp; Device Management,* then tap\u00a0the app\u2019s configuration profile.<\/li>\n<li>Then tap Delete Profile. If asked, enter your device passcode, then tap Delete.<\/li>\n<\/ul>\n<\/li>\n<li>Restart your\u00a0iPhone.<\/li>\n<\/ol>\n<p>* If you don&#8217;t see this option in Settings, then no device management profiles are installed on your device.<\/p>\n<p>For Android users, from your phone you can <a href=\"https:\/\/support.google.com\/android\/answer\/2521768\">delete the app<\/a> from within the Google Play Store, or do the following:<\/p>\n<ol>\n<li>Long-press the app icon until the Select \/ Add to Home \/ Uninstall popup appears. Tap \u201cUninstall\u201d (on the right).<\/li>\n<li>When the popup asked \u201cDo you want to uninstall this app?,\u201d choose \u201cOK.\u201d<\/li>\n<li>Confirm that the app is gone by going to \u201cSettings\u201d (the gear in the upper right corner of your screen), clicking on \u201cApps,\u201d and scrolling to confirm that the app has not lingered.<\/li>\n<\/ol>\n<p><strong>Are you a victim and want us to check your app or URL?<\/strong><\/p>\n<p>If you have experienced this type of fraud or wish to report suspicious applications or URLs connected to CryptoRom or other malware <strong>at no cost<\/strong>, please reach out directly via Twitter to <a href=\"https:\/\/twitter.com\/jag_chandra\">@jag_chandra.<\/a><\/p>\n<p>SophosLabs would like to acknowledge <strong>Xinran Wu and Szabolcs L\u00e9vai<\/strong> for their contribution to this article.<\/p>\n<p>&nbsp;<\/p>\n<p>IOCs<\/p>\n<p>App URL &#8211; https:\/\/apps.apple.com\/US\/app\/id1642848412<\/p>\n<p>ID &#8211; com.QRCheck.APP<\/p>\n<p class=\"xmsonormal\">IPA &#8211; c336394b1600fc713ce65017ebf69d59e352c8d9how<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2023\/02\/01\/fraudulent-cryptorom-trading-apps-sneak-into-apple-and-google-app-stores\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/shutterstock_1547820455.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jagadeesh Chandraiah| Date: Wed, 01 Feb 2023 11:00:48 +0000<\/strong><\/p>\n<p>Using changing remote content, apps slide by official review process to deliver fraud through the Apple App Store and Google Play Store.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[25389,25390,23933,129,28484,28485,28486,27030,16771],"class_list":["post-21128","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-cryptocurrency-fraud","tag-cryptorom","tag-fake-apps","tag-featured","tag-ios-fake-app","tag-pigbutchering","tag-shazhupan","tag-sophos-x-ops","tag-threat-research"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21128","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21128"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21128\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21128"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21128"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21128"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}