{"id":21217,"date":"2023-02-13T05:20:53","date_gmt":"2023-02-13T13:20:53","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/02\/13\/news-14949\/"},"modified":"2023-02-13T05:20:53","modified_gmt":"2023-02-13T13:20:53","slug":"news-14949","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/02\/13\/news-14949\/","title":{"rendered":"Fool&#8217;s Gold: dissecting a fake gold market pig-butchering scam"},"content":{"rendered":"<p><strong>Credit to Author: gallagherseanm| Date: Mon, 13 Feb 2023 11:00:03 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p>Over the past 18 months, we\u2019ve tracked an ever-expanding and evolving family of fraud rings using fake mobile applications and communications over popular messaging platforms to lure victims into investment schemes, using emotional appeals, curated images and media, and well-scripted manipulations alongside well-developed mobile app infrastructure to gain the confidence of victims and walk them slowly into giving up their personal savings.<\/p>\n<p>These scams, which we dubbed \u201c<a href=\"https:\/\/news.sophos.com\/en-us\/tag\/cryptorom\/\">CryptoRom<\/a>\u201d in our earlier research, became known in China as sha zhu pan (\u6740\u732a\u76d8) (\u201cpig butchering\u201d). The scam form originated in China and went global during the COVID 19 pandemic\u2014in part because of Chinese government crackdowns on cryptocurrency crime and other fraud within China, and in part because of expanding opportunities created by economic crises brought on by COVID.<\/p>\n<p>In previous research, we\u2019ve tracked how the perpetrators moved from targeting people in Chinese-speaking communities to an increasingly larger audience, and the extent of their technical resources. Recently, we <a href=\"https:\/\/news.sophos.com\/en-us\/2023\/02\/01\/fraudulent-cryptorom-trading-apps-sneak-into-apple-and-google-app-stores\/\">discovered two scam rings had managed to publish applications onto the Apple iOS App Store<\/a>, slipping past Apple\u2019s rigorous review process. Pig butchering scammers are increasingly casting their net more widely, targeting victims in Western countries with the same tactics that they\u2019ve used successfully throughout Asia.<\/p>\n<p>As part of our continuing research into the criminal actors behind these schemes, I\u2019ve continued to investigate the tactics, tools, and procedures common across them, and look for emerging trends. As an indication of how common they\u2019ve become, I was approached by multiple, separate scam operations personally, each running different variations on pig butchering. I interacted with two of the scam operations in the hopes of extending our knowledge of them, as well as collecting the fake trading apps they used and data about their supporting infrastructure and organizational workflow.<\/p>\n<p>The first, reviewed in this post, was a Hong Kong-based ring leveraging the MetaTrader 4 application\u2014a legitimate trading application from a Russian software company that we have seen abused previously\u2014to run a fake gold-trading marketplace. They used Windows, Android and iOS versions of the application, downloadable from a fake bank website; the iOS application used an enterprise mobile device management scheme to deploy to victims\u2019 devices. To \u201cenroll\u201d in the marketplace, victims were instructed to upload a significant amount of personally identifying information, including photos of government identity documents and tax identification numbers, and then wire cash to the scammers.<\/p>\n<p>The second scam (detailed in an upcoming report) was run by a Cambodia-based Chinese organized crime operation that ran a fake crypto trading application using the TradingView brand. The application, offered from a fake app store, came in Android and iOS \u201cweb clip\u201d versions. This scam involved a much more developed social engineering operation, but followed the same pig butchering formula. Wallets associated with the scam app had visibly taken in about $500,000 US in cryptocurrency from victims in a one-month period.<\/p>\n<p>We have shared data on these scams with Apple and Google, as well as other organizations that either were impersonated as part of the scams or were used as part of the swindle chain. We\u2019ve also shared data with the companies used to provide infrastructure for the scams, and with appropriate CERT teams to aid in their takedown.<\/p>\n<p>Both scams are still active. This is in part due to the difficulty of getting infrastructure operators to act to shut them down, and the \u201cwhack-a-mole\u201c nature of these operations\u2014when one set of app certificates and infrastructure gets taken down, another springs up quickly to take its place.<\/p>\n<h3>You had me at \u201challo\u201d<\/h3>\n<p>The first scammer I engaged approached me much in the same way as the <a href=\"https:\/\/news.sophos.com\/en-us\/2022\/05\/17\/liquidity-mining-scams-add-another-layer-to-cryptocurrency-crime\/\">liquidity mining scam we previously documented<\/a>\u2014via Twitter direct message. In fact, I left the DM untouched for nearly a month in my requests before engaging with it on October 3.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgoldtwitterdm1.jpeg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-89786 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgoldtwitterdm1.jpeg\" alt=\"\" width=\"550\" height=\"480\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgoldtwitterdm1.jpeg 550w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgoldtwitterdm1.jpeg?resize=300,262 300w\" sizes=\"auto, (max-width: 550px) 100vw, 550px\" \/><\/a><\/p>\n<p>Starting with a \u201cHallo,\u201d the scammer engaged me in Twitter direct messages to determine if I was a suitable target for the scam. \u201cShe\u201d claimed to be a 40-year-old woman from Hong Kong. Shortly after I started responding, the account screen name was changed from \u201cAlice\u201d to \u201cChen Zimo.\u201d This profile is still live on Twitter, though it was reported.<\/p>\n<figure id=\"attachment_89721\" aria-describedby=\"caption-attachment-89721\" style=\"width: 627px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/Figure1FoolsGold.png\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-89721 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/Figure1FoolsGold.png\" alt=\"\" width=\"627\" height=\"525\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/Figure1FoolsGold.png 627w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/Figure1FoolsGold.png?resize=300,251 300w\" sizes=\"auto, (max-width: 627px) 100vw, 627px\" \/><\/a><figcaption id=\"caption-attachment-89721\" class=\"wp-caption-text\">The scam profile. The display name was changed from &#8220;Alice&#8221; to &#8220;Chen Zimo&#8221; after the first exchange of DMs.<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>I told the scammer I was a cybersecurity threat researcher and that I investigated scams. \u201cSo you\u2019re a cop?\u201d the scammer asked. When I replied in the negative, the conversation quickly turned to investments\u2014in this case, the gold market as shown below.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/FoolsGoldDM-2.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89788\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/FoolsGoldDM-2.png\" alt=\"\" width=\"640\" height=\"811\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/FoolsGoldDM-2.png 710w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/FoolsGoldDM-2.png?resize=237,300 237w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>I expressed suspicion over the rapid movement in the conversation. The scammer tried to explain that this was an act of honesty, actually:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgoldtwitterdm3.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89789\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgoldtwitterdm3.png\" alt=\"\" width=\"596\" height=\"740\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgoldtwitterdm3.png 596w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgoldtwitterdm3.png?resize=242,300 242w\" sizes=\"auto, (max-width: 596px) 100vw, 596px\" \/><\/a><\/p>\n<p>I let the conversation rest there for a few days.<\/p>\n<figure id=\"attachment_89723\" aria-describedby=\"caption-attachment-89723\" style=\"width: 602px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/Figure2FoolsGold.png\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-89723\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/Figure2FoolsGold.png\" alt=\"\" width=\"602\" height=\"486\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/Figure2FoolsGold.png 602w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/Figure2FoolsGold.png?resize=300,242 300w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><\/a><figcaption id=\"caption-attachment-89723\" class=\"wp-caption-text\">Direct messages, including video, on Twitter from scam during idle period.<\/figcaption><\/figure>\n<p>When I picked up the message thread again, the scammer moved the conversation off Twitter, first asking if I used WhatsApp. I said that I didn\u2019t, but I used Telegram. She said that was also good, and requested my account name.<\/p>\n<p>Their Telegram account had a visible phone number listed with a UK mobile provider. A check of carrier information showed the number was with a carrier providing 3G legacy support and WiFi dialing\u2014essentially making it a VoIP provider. After I added the Telegram account to my contacts, the scammer quickly changed their name (which had also been \u201cAlice\u201d) to \u201cChen Zimo\u201d to match the Twitter account\u2014but not before the first Telegram message.<br \/> <a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/fools-gold-telegram-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89738\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/fools-gold-telegram-1.png\" alt=\"\" width=\"640\" height=\"661\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/fools-gold-telegram-1.png 1607w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/fools-gold-telegram-1.png?resize=290,300 290w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/fools-gold-telegram-1.png?resize=768,793 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/fools-gold-telegram-1.png?resize=991,1024 991w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/fools-gold-telegram-1.png?resize=1487,1536 1487w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/fools-gold-telegram-1.png?resize=32,32 32w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/fools-gold-telegram-2.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89739\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/fools-gold-telegram-2.png\" alt=\"\" width=\"640\" height=\"698\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/fools-gold-telegram-2.png 1532w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/fools-gold-telegram-2.png?resize=275,300 275w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/fools-gold-telegram-2.png?resize=768,837 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/fools-gold-telegram-2.png?resize=939,1024 939w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/fools-gold-telegram-2.png?resize=1409,1536 1409w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>\u201cChen\u201d told me that \u201cher\u201d uncle had taught her how to do short-term trading on the London spot gold market. \u00a0While not taking an obvious hard-sell approach, pretty much everything the scammer messaged about was \u201cgold trading\u201d:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/fools-gold-telegram-3.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89740\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/fools-gold-telegram-3.png\" alt=\"\" width=\"640\" height=\"689\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/fools-gold-telegram-3.png 1302w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/fools-gold-telegram-3.png?resize=279,300 279w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/fools-gold-telegram-3.png?resize=768,827 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/fools-gold-telegram-3.png?resize=951,1024 951w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a>I asked some questions about the market platform she used. She provided a name, and I did a quick web search for it. Thanks to some good search engine optimization\u2014including fake reviews posted on a foreign exchange tracking site&#8211; the fraud site appeared above the site of the legitimate company that the scam was impersonating\u2013a Japanese banking company. The site appeared to provide foreign exchange and commodity trading services.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/Fools-gold-telegram-5-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89748\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/Fools-gold-telegram-5-1.png\" alt=\"\" width=\"640\" height=\"519\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/Fools-gold-telegram-5-1.png 1832w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/Fools-gold-telegram-5-1.png?resize=300,244 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/Fools-gold-telegram-5-1.png?resize=768,623 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/Fools-gold-telegram-5-1.png?resize=1024,831 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/Fools-gold-telegram-5-1.png?resize=1536,1247 1536w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>The scammer names the platform<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/FOOLSGOLD-WEBSITE.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89745\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/FOOLSGOLD-WEBSITE.png\" alt=\"\" width=\"640\" height=\"414\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/FOOLSGOLD-WEBSITE.png 1267w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/FOOLSGOLD-WEBSITE.png?resize=300,194 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/FOOLSGOLD-WEBSITE.png?resize=768,497 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/FOOLSGOLD-WEBSITE.png?resize=1024,663 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>The fictitious site, hosted in Hong Kong.<\/p>\n<p>Researching the host used by the site uncovered nearly identical sites for several other brands, including one that used the same design as shown below. The server was hosted by Shenzhen Balian Network Technology Co. in Hong Kong.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/FoolsGoldsite2.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89773\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/FoolsGoldsite2.png\" alt=\"\" width=\"640\" height=\"480\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/FoolsGoldsite2.png 752w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/FoolsGoldsite2.png?resize=300,225 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a> <a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/FoolsGoldSite3.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89774\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/FoolsGoldSite3.png\" alt=\"\" width=\"640\" height=\"480\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/FoolsGoldSite3.png 746w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/FoolsGoldSite3.png?resize=300,225 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>Again, I expressed some concern about the site, after collecting samples from the linked applications: \u201cWhy is the server hosted in Hong Kong? Why is this not hosted in the same place as the actual company\u2019s website?\u201d<a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/Fools-gold-telegram-6-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89746\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/Fools-gold-telegram-6-1.png\" alt=\"\" width=\"587\" height=\"522\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/Fools-gold-telegram-6-1.png 587w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/Fools-gold-telegram-6-1.png?resize=300,267 300w\" sizes=\"auto, (max-width: 587px) 100vw, 587px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>At this point the scammer started complaining about me investigating all this. I had also found a reference to the site on a UK tax questions site, in which an \u201cinvestor\u201d inquired about having to pay taxes on earnings before withdrawing. This is a common tactic of pig butchering scams; to squeeze the final bit of cash out of victims, they often tell them through the fake app or website that they must pay as much as 20% of their fake earnings in taxes up-front before they can withdraw their money. They then cut off communications with the victim.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgold-telegram-8.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89749\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgold-telegram-8.png\" alt=\"\" width=\"640\" height=\"625\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgold-telegram-8.png 880w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgold-telegram-8.png?resize=300,293 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgold-telegram-8.png?resize=768,751 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgold-telegram-8.png?resize=32,32 32w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgold-telegram-8.png?resize=50,50 50w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgold-telegram-8.png?resize=64,64 64w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a>The scammer told me there was no taxes on this investment, that they were included in the trading fees and she had never paid taxes on the trades in Hong Kong.<\/p>\n<p>One thing she was telling the truth about was her location. I had passed a tracking token via our chat, and confirmed she was on an iOS device in Hong Kong.<\/p>\n<p>The scammer continued to engage with me, telling me about silver deals and other fictions. I then expressed interest in learning more about what \u201cshe\u201d was doing\u2014so I could start collecting further technical details.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/fools-gold-infograph-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-89754\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/fools-gold-infograph-1.png\" alt=\"\" width=\"1024\" height=\"576\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/fools-gold-infograph-1.png 2048w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/fools-gold-infograph-1.png?resize=300,169 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/fools-gold-infograph-1.png?resize=768,432 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/fools-gold-infograph-1.png?resize=1024,576 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/fools-gold-infograph-1.png?resize=1536,864 1536w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<h3>Sanctioned apps<\/h3>\n<p>Surprised and happy about my sudden interest, \u201cChen\u201d directed me to download the mobile app from the fake website and not the official Google Play, Apple App Store, or Microsoft Store. For Android and Windows, the fake apps are a simple download (of an APK and an installation .EXE, respectively). For iOS the fake app uses the <a href=\"https:\/\/news.sophos.com\/en-us\/2021\/10\/13\/cryptorom-fake-ios-cryptocurrency-apps\/\"> 2021\u00a0<\/a>.<\/p>\n<p>The Windows app\u2014a pirated version of the MetaTrader 4 desktop application&#8211;was already on our detection list. (A refreshed version was not, but we have since added it.) This application has a legitimate signature (though based on a Russian certificate), but its connection data has been altered to add a malicious server to its list. The same is true of the Android and iOS applications\u2014on the surface both are legitimate apps, signed by the developer, but with altered connection metadata. Because of the query language used by MetaTrader 4, it is possible to essentially build new applications on top of the apps themselves.<\/p>\n<p>Both the Windows and Android apps were simple downloads. But for iOS, installation required accepting an enterprise mobile management profile connecting my (test) phone to a server in China \u2013 a huge red flag, but one that many users could be socially engineered to ignore.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgold-emdm1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-89757\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgold-emdm1.png\" alt=\"\" width=\"453\" height=\"800\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgold-emdm1.png 304w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgold-emdm1.png?resize=170,300 170w\" sizes=\"auto, (max-width: 453px) 100vw, 453px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgold-emdm2.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89758\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgold-emdm2.jpg\" alt=\"\" width=\"455\" height=\"771\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgold-emdm2.jpg 455w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgold-emdm2.jpg?resize=177,300 177w\" sizes=\"auto, (max-width: 455px) 100vw, 455px\" \/><\/a><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgold-emdm3-1.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89759\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgold-emdm3-1.jpg\" alt=\"\" width=\"454\" height=\"786\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgold-emdm3-1.jpg 454w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgold-emdm3-1.jpg?resize=173,300 173w\" sizes=\"auto, (max-width: 454px) 100vw, 454px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>I asked why I had to download the app this way and was told it was \u201cUS sanctions\u201d:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgold-emdm4-2.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89761\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgold-emdm4-2.png\" alt=\"\" width=\"640\" height=\"300\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgold-emdm4-2.png 1130w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgold-emdm4-2.png?resize=300,141 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgold-emdm4-2.png?resize=768,360 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgold-emdm4-2.png?resize=1024,480 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>In fact, that\u2019s semi-accurate\u2014MetaTrader 4 is developed by a Russian software company and is not available in the US Apple App Store. The version downloaded off the fake website is only slightly modified, to include a list of backend servers that points to the one controlled by the scammers. The fact that the legitimate app is not available on the iOS app store is a boon to the scammers, as there\u2019s no way for the target to simply download a legitimate copy.<\/p>\n<p>Before going forward with the iOS app download, I began a packet capture of the traffic. The full list of domains and IP addresses involved in the criminal application infrastructure is provided in the IoC file linked at the end of this report. Most of the elements were hosted on Binfang and Alibaba hosts, with some content provided through Cloudflare; some certificates were staged using Akamai.<\/p>\n<p>I was walked through the installation by the scammers, who sent screen shots with red circles to show me where to tap. I was guided through finding the right server name in the configuration (one that mimicked the financial institution the scammers were imitating):<\/p>\n<p class=\"jetpack-slideshow-noscript robots-nocontent\">This slideshow requires JavaScript.<\/p>\n<div id=\"gallery-89708-1-slideshow\" class=\"jetpack-slideshow-window jetpack-slideshow jetpack-slideshow-black\" data-trans=\"fade\" data-autostart=\"1\" data-gallery=\"[{&quot;src&quot;:&quot;https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgoldappguide1.png?w=449&quot;,&quot;id&quot;:&quot;89766&quot;,&quot;title&quot;:&quot;foolsgoldappguide1&quot;,&quot;alt&quot;:&quot;&quot;,&quot;caption&quot;:&quot;Connecting to MetaQuotesu0026#8217; server fails because of the altered configurationu0026#8230;&quot;,&quot;itemprop&quot;:&quot;image&quot;},{&quot;src&quot;:&quot;https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgoldappguide2.jpg?w=294&quot;,&quot;id&quot;:&quot;89768&quot;,&quot;title&quot;:&quot;foolsgoldappguide2&quot;,&quot;alt&quot;:&quot;&quot;,&quot;caption&quot;:&quot;So the scammer directs me to type in the fake banku0026#8217;s nameu0026#8230;&quot;,&quot;itemprop&quot;:&quot;image&quot;},{&quot;src&quot;:&quot;https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgoldappguide3.jpg?w=288&quot;,&quot;id&quot;:&quot;89769&quot;,&quot;title&quot;:&quot;foolsgoldappguide3&quot;,&quot;alt&quot;:&quot;&quot;,&quot;caption&quot;:&quot;And join the malicious market server.&quot;,&quot;itemprop&quot;:&quot;image&quot;}]\" itemscope itemtype=\"https:\/\/schema.org\/ImageGallery\"><\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>When I tapped the right one, I was then guided through setting up a \u201cpractice\u201d account with a balance of $100,000. Once that was complete, the app displayed a market tracking screen\u2014one streamed live from another server in Hong Kong.<\/p>\n<figure id=\"attachment_89781\" aria-describedby=\"caption-attachment-89781\" style=\"width: 359px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/unclerichard1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-89781\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/unclerichard1.png\" alt=\"\" width=\"359\" height=\"414\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/unclerichard1.png 272w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/unclerichard1.png?resize=260,300 260w\" sizes=\"auto, (max-width: 359px) 100vw, 359px\" \/><\/a><figcaption id=\"caption-attachment-89781\" class=\"wp-caption-text\">Let me introduce you to my uncle.<\/figcaption><\/figure>\n<p>After a few lessons in how to set up trades, profit-taking points, and loss limits\u2014each of which the scammer guided me through with screenshots matching the time of our discussion&#8211; the scammer offered to introduce me to her \u201cuncle\u201d to guide me through setting up a real account and getting trading tips.<\/p>\n<p>\u201cUncle Martin Richard\u201d had quite the (fictional) pedigree\u2014the scammer claimed \u201che\u201d was a former Goldman Sachs analyst.<\/p>\n<figure id=\"attachment_89782\" aria-describedby=\"caption-attachment-89782\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/UncleRichard2.png\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-89782 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/UncleRichard2.png\" alt=\"Uncle Martin Enters the chat\" width=\"640\" height=\"553\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/UncleRichard2.png 706w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/UncleRichard2.png?resize=300,259 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-89782\" class=\"wp-caption-text\">Uncle Martin Richard enters the chat.<\/figcaption><\/figure>\n<p>\u201cMartin Richard\u201d told me to register an account through yet another scam host page. It mimicked a Know-Your-Customer style registration, requesting photos of government ID. The site also had animated snow in the background, and a picture of downtown Chicago (recognizable by the Navy Pier and a few other landmarks):<\/p>\n<figure id=\"attachment_89780\" aria-describedby=\"caption-attachment-89780\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgoldaccountsite.png\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-89780 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgoldaccountsite.png\" alt=\"The fake Mebuki Financial site for registering accounts\" width=\"640\" height=\"349\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgoldaccountsite.png 1368w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgoldaccountsite.png?resize=300,163 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgoldaccountsite.png?resize=768,418 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/foolsgoldaccountsite.png?resize=1024,558 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-89780\" class=\"wp-caption-text\">The fake Mebuki Financial site for registering accounts, complete with animated snow.<\/figcaption><\/figure>\n<p>Once a \u201creal\u201d account was set up, \u201cMartin\u201d said, I would be able to deposit money and start executing trades at his direction.<\/p>\n<figure id=\"attachment_89783\" aria-describedby=\"caption-attachment-89783\" style=\"width: 384px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/unclerichard3.png\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-89783 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/unclerichard3.png\" alt=\"Uncle Martin Richard Telegram message forecasting gold market swing\" width=\"384\" height=\"224\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/unclerichard3.png 384w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/unclerichard3.png?resize=300,175 300w\" sizes=\"auto, (max-width: 384px) 100vw, 384px\" \/><\/a><figcaption id=\"caption-attachment-89783\" class=\"wp-caption-text\">Purported insider information from &#8220;Martin Richard&#8221; priming for a big investment.<\/figcaption><\/figure>\n<p>The \u201cMartin\u201d Telegram account, unlike the \u201cChen\u201d account, used a US number registered through <a href=\"https:\/\/www.peerlessnetwork.com\/about-us\/\">Peerless Network<\/a>, another VoiP provider.<\/p>\n<h3>Whacking the Mole<\/h3>\n<p>Work on the scam began in October, and much of the initial gathering of technical details happened in November. We shared information on this actor with Japan CERT (because of the brand jacking involving a Japanese financial institution), Apple, Google, and others. \u00a0We reported the initial enterprise app distribution \u201cteam\u201d to Apple, and labeled the domains as malware hosts in our reputation database.<\/p>\n<p>But as these actions took hold, the scam operation shifted to new domains. I told the scammers I no longer was able to get the app downloaded to work, and they dutifully pointed me to the new download infrastructure (using the domain mebukifx[.]com) and new enterprise mobile provisioning profile.<\/p>\n<p>As Jagadeesh Chandraiah reported in <a href=\"https:\/\/news.sophos.com\/en-us\/2022\/03\/16\/cryptorom-bitcoin-swindlers-continue-to-target-vulnerable-iphone-and-android-users\/\">earlier examinations<\/a> of these schemes, the abuse of the iOS enterprise application distribution scheme appears to be done through a third-party service for iOS developers. Ad hoc application distribution is not exceptionally unusual in much of the world because of the limitations of the official Apple Store, particularly those put in place to meet with Chinese government mandates. When the developer licenses associated with one of these services is pulled, the service providers simply stand up another one, or their developers move to a new distributor.<\/p>\n<h3>Grading the scammers<\/h3>\n<p>This particular scam operation was not as polished as some of the others I\u2019ve dealt with from a social engineering standpoint. The efforts to engender a relationship were limited to a few photos and a video sent to establish the false identity. At one point the \u201cuncle\u201d began responding in Chinese to questions in English. But the technical sophistication of the websites and the mobile apps may have been enough to convince some victims to transfer cash into their fake exchange, and engagement in other languages may have been more convincing.<\/p>\n<p>In comparison, the next case I\u2019ll be discussing\u2014a Cambodia-based ring running multiple crypto trading scams\u2014had a much more developed backstory with more direct engagement. The scammers used a combination of flirtation, matching of interests, and voice and video calls over the messaging app to bolster trust-building. (For example, when the scammers learned I had a cat, their spokesperson suddenly also had a cat.) While the Hong Kong-based ring had low-intensity engagement because of the time difference, the Cambodia-based scammers worked on North America time and messaged multiple times per day.<\/p>\n<figure id=\"attachment_89784\" aria-describedby=\"caption-attachment-89784\" style=\"width: 402px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/harleypreview.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-89784 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/harleypreview.jpg\" alt=\"One of the \u201cactivity\u201d photos sent by the Cambodia scammers to build the persona of their spokesperson.\" width=\"402\" height=\"472\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/harleypreview.jpg 402w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/harleypreview.jpg?resize=256,300 256w\" sizes=\"auto, (max-width: 402px) 100vw, 402px\" \/><\/a><figcaption id=\"caption-attachment-89784\" class=\"wp-caption-text\">One of the \u201cactivity\u201d photos sent by the Cambodia scammers to build the persona of their spokesperson.<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>Because of the fluid nature of the technical side of these scams, the only reliable defense against them is public awareness of how these threats operate. What may have been obvious as a scam to me may not have been picked up upon by many educated people in vulnerable situations\u2014which, given how the COVID 19 pandemic and its aftermath have affected many people, is a substantial population of potential victims. And these scams will only grow more sophisticated with time. This scam\u2019s focus on gold\u2014something many people will have greater confidence in than cryptocurrency\u2014is an example of how these scams will continue to find niches that they can exploit.<\/p>\n<p>Indicators of compromise for this scam can be found on the SophosLabs Github page<a href=\"https:\/\/github.com\/sophoslabs\/IoCs\/blob\/master\/FoolsGoldMetaTraderShaZhuPan.csv\"> here<\/a>.<\/p>\n<h4>Sophos X-Ops acknowledges the contributions of Jagadeesh Chandraiah of SophosLabs to this report.<\/h4>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2023\/02\/13\/fools-gold-dissecting-a-fake-gold-market-pig-butchering-scam\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/shutterstock_1035553054.jpg\"\/><\/p>\n<p><strong>Credit to Author: gallagherseanm| Date: Mon, 13 Feb 2023 11:00:03 +0000<\/strong><\/p>\n<p>Scammers use counterfeit bank website, hijacked legitimate app to defraud and steal identifying information.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[129,28585,28485,28486,16771],"class_list":["post-21217","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-featured","tag-metatrader4","tag-pigbutchering","tag-shazhupan","tag-threat-research"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21217","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21217"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21217\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21217"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21217"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}