{"id":8778,"date":"2017-08-17T02:30:06","date_gmt":"2017-08-17T10:30:06","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/08\/17\/news-2551\/"},"modified":"2017-08-17T02:30:06","modified_gmt":"2017-08-17T10:30:06","slug":"news-2551","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/08\/17\/news-2551\/","title":{"rendered":"Taxi Trojans are on the way"},"content":{"rendered":"<p><strong>Credit to Author: Alex Drozhzhin| Date: Thu, 17 Aug 2017 09:32:29 +0000<\/strong><\/p>\n<p>\tYou&#8217;re in a hurry, trying to get to work, a business meeting, a date. So you launch your favorite app for booking a taxi as usual, but this time, it prompts you to enter your credit card number. Does that seem suspicious? It may not \u2014 apps forget information, and all you have to do is add your card number again.\t\t<\/p>\n<p>\tHowever, after some time you notice money disappearing from your account. What happened? You may be the unlucky winner of a mobile Trojan. This kind of malware has been caught recently <a href=\"https:\/\/securelist.com\/booking-a-taxi-for-faketoken\/81457\/\">stealing bank data by impersonating the interfaces of taxi-booking apps<\/a>.\t\t<\/p>\n<p> <a href=\"https:\/\/d1srlirzdlmpew.cloudfront.net\/wp-content\/uploads\/sites\/92\/2017\/08\/17052732\/faketoken-trojan-taxi-featured.jpg\"><img decoding=\"async\" src=\"https:\/\/d1srlirzdlmpew.cloudfront.net\/wp-content\/uploads\/sites\/92\/2017\/08\/17052732\/faketoken-trojan-taxi-featured-1024x673.jpg\" alt=\"\"><\/a> <\/p>\n<p>\tThe Faketoken Trojan has existed for a long time, and it has been upgraded for many years. Our experts named the current version &#8220;Faketoken.q,&#8221; and by now it has learned a significant number of tricks.\t\t<\/p>\n<p>\tAfter getting onto a smartphone (judging by the malware icon, Faketoken infiltrates smartphones through bulk SMS messages with a prompt to download some picture) and installing the necessary modules, the Trojan hides its shortcut icon and starts background monitoring of everything that happens in the system.\t\t<\/p>\n<div id=\"attachment_18004\" style=\"width: 778px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/d1srlirzdlmpew.cloudfront.net\/wp-content\/uploads\/sites\/92\/2017\/08\/17052949\/faketoken-installed.jpg\"><img decoding=\"async\" src=\"https:\/\/d1srlirzdlmpew.cloudfront.net\/wp-content\/uploads\/sites\/92\/2017\/08\/17052949\/faketoken-installed.jpg\" alt=\"\"  style=\"width:50%\"  class=\"size-full wp-image-18004\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">The icon of the installed Faketoken Trojan<\/p>\n<\/div>\n<p>\tFirst, the Trojan is interested in the user&#8217;s calls. As soon as it detects a call, it starts recording. When the call is finished, Faketoken sends the recording to the criminal&#8217;s server. Second, the Trojan also checks which apps the smartphone&#8217;s owner uses.\t\t<\/p>\n<p>\tWhen Faketoken detects the launch of an app whose interface it can simulate, the Trojan immediately overlays the app with its own screen. To achieve that, it uses a standard Android feature that supports <a href=\"https:\/\/www.kaspersky.com\/blog\/cloak-and-dagger-attack\/\">showing screen overlays on top of all other apps<\/a>. A whole bunch of legitimate apps, such as messengers, window managers, and so on, use this feature.\t\t<\/p>\n<p>\tThe overlaying window matches the colors of the original app&#8217;s interface. In this window, the Trojan prompts the user to enter the number of his or her credit card, including the verification code from the back of the card.\t\t<\/p>\n<div id=\"attachment_18005\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/d1srlirzdlmpew.cloudfront.net\/wp-content\/uploads\/sites\/92\/2017\/08\/17052952\/faketoken-stealing-interface.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d1srlirzdlmpew.cloudfront.net\/wp-content\/uploads\/sites\/92\/2017\/08\/17052952\/faketoken-stealing-interface-1024x819.jpg\" alt=\"\" width=\"1024\" height=\"819\" class=\"size-large wp-image-18005\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">The Faketoken.q Trojan impersonates taxi-booking apps popular in Russia<\/p>\n<\/div>\n<p>\tActually, Faketoken.q is after a huge variety of apps that have one thing in common: in them, a request to enter payment data looks normal enough not to arouse suspicion. Among the attacked apps are a number of mobile banking apps, Android Pay, the Google Play Store, apps for booking flights and hotel rooms, and apps for paying traffic tickets \u2014 as well as apps for booking taxis.\t\t<\/p>\n<p>\tDuring the very stage of stealing money from the user, Faketoken <a href=\"https:\/\/www.kaspersky.com\/blog\/banking-trojans-bypass-2fa\/11545\/\">resorts to another ruse<\/a>, intercepting all incoming SMS messages, hiding them from the user, and forwarding them to the criminals&#8217; server, where one-time passwords for payment confirmation from those messages are extracted.\t\t<\/p>\n<blockquote data-secret=\"U5GsYPmhti\" class=\"wp-embedded-content\">\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/banking-trojans-bypass-2fa\/11545\/\">How banking Trojans bypass two-factor authentication<\/a><\/p>\n<\/blockquote>\n<p> <iframe loading=\"lazy\"  src=\"https:\/\/www.kaspersky.com\/blog\/banking-trojans-bypass-2fa\/11545\/embed\/#?secret=U5GsYPmhti\" width=\"100%\" height=\"420\" frameborder=\"0\" ><\/iframe>  <\/p>\n<p>\tJudging by the small number of attacks that we have registered and the UI artifacts, which you can see in one of the screenshots above, we&#8217;d say the researchers at our antivirus laboratory <a href=\"https:\/\/securelist.com\/booking-a-taxi-for-faketoken\/81457\/\">got their hands on one of the test versions of the Trojan<\/a>, not the final one.\t\t<\/p>\n<p>\tWe must give the assiduous creators of Faketoken their due. They will most likely improve the Trojan, and a wave of infection incidents may sprout from the &#8220;commercial&#8221; version at some point.\t\t<\/p>\n<p>\tCurrently the Trojan is focused on users in Russia, but as we&#8217;ve seen many times in the past, cybercriminals constantly steal ideas from each other, so it won&#8217;t take long for them to adopt the same trick in other countries. A lot of city dwellers have taxi-booking apps installed these days, so this trick represents a good opportunity for malware creators.\t\t<\/p>\n<p>\tBelow you can find several pieces of advice on how to protect yourself against Faketoken and similar mobile Trojans that steal card numbers and intercept SMS messages with one-time passwords used to confirm payments.\t\t<\/p>\n<ul>\n<li>It is imperative that you go into Android&#8217;s settings and prohibit the installation of apps from unknown sources. To block installation from unknown sources, go to <em>Settings -&gt; Security<\/em> and uncheck <em>Unknown sources<\/em>.<\/li>\n<\/ul>\n<p> <a href=\"https:\/\/d1srlirzdlmpew.cloudfront.net\/wp-content\/uploads\/sites\/92\/2017\/08\/17053208\/unknown-sources-EN.jpg\"><img decoding=\"async\" src=\"https:\/\/d1srlirzdlmpew.cloudfront.net\/wp-content\/uploads\/sites\/92\/2017\/08\/17053208\/unknown-sources-EN-1024x711.jpg\" alt=\"\"  style=\"width:50%\" class=\"aligncenter size-large wp-image-18007\" \/><\/a> <\/p>\n<ul>\n<li>Always pay attention to what access permissions an app requests during installation, even if you downloaded it from Google Play (<a href=\"https:\/\/www.kaspersky.com\/blog\/dresscode-android-trojan\/13219\/\">there might be Trojans<\/a> in the official app store as well). You can learn more about Android permissions <a href=\"https:\/\/blog.kaspersky.com\/android-permissions-guide\/14014\/\">in this article<\/a>.<\/li>\n<\/ul>\n<ul>\n<li>It is a good idea to protect your smartphone by installing antivirus, which can find infections hiding in an app. For example, you can use our <a href=\"https:\/\/app.appsflyer.com\/com.kms.free?pid=smm&amp;c=ww_kdaily\">basic Kaspersky Internet Security for Android, which you can download from Google Play free<\/a>.<\/li>\n<\/ul>\n<p> <input type=\"hidden\" class=\"category_for_banner\" value=\"2523\" \/> <br \/><a href=\"https:\/\/www.kaspersky.com\/blog\/faketoken-trojan-taxi\/18002\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Alex Drozhzhin| Date: Thu, 17 Aug 2017 09:32:29 +0000<\/strong><\/p>\n<p>Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[10462,13765,12328,13766,3764,11092,32,3010,10438,12269],"class_list":["post-8778","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-android","tag-apps-main-tag-android","tag-banking-trojans","tag-faketoken","tag-malware","tag-mobile-devices","tag-news","tag-taxi","tag-threats","tag-trojans"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8778","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=8778"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8778\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=8778"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=8778"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=8778"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}