Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

XLoader Trojan Poses as Security App for Android

A new variant of the XLoader Trojan is targeting Android devices by posing as a security application, and also attempts to infect iPhones and iPads through a malicious iOS profile, Trend Micro reports. 

A new variant of the XLoader Trojan is targeting Android devices by posing as a security application, and also attempts to infect iPhones and iPads through a malicious iOS profile, Trend Micro reports. 

Previously, the malware was observed posing as Facebook, Chrome, and other legitimate applications, in an attempt to trick users into downloading it. The new variant features an updated deployment technique and also contains changes in its code that set it apart. 

The malware is hosted on fake websites that mimic legitimate domains, so as to trick users into downloading a fake security Android application package (APK). Links to the malicious websites are delivered to the intended victims via SMiShing, Trend Micro’s security researchers reveal.

On Android, the APK is installed only if the user has allowed the installation of apps from unknown sources. On iOS devices, users are served a phishing page, but only after they accept to install a malicious configuration profile that claims to resolve an issue preventing the site to load. 

The malware leverages Twitter profiles to encode its real command and control (C&C) addresses in the Twitter names. It also includes a comment to collect unique identifiers of mobile devices such as IMSI, ICCID, Android ID, and device serial number. 

“Considering the other malicious behaviors of XLoader, this added operation could be very dangerous as threat actors can use it to perform targeted attacks,” Trend Micro notes

On Apple devices, the malicious iOS profile gathers the unique device identifier (UDID), International Mobile Equipment Identity (IMEI), Integrated Circuit Card ID (ICCID), mobile equipment identifier (MEID), version number, and product number. 

“After the profile is installed, the user will then be redirected to another Apple phishing site. The phishing site uses the gathered information as its GET parameter, allowing the attacker to access the stolen information,” the security researchers say.

Advertisement. Scroll to continue reading.

Another variant of XLoader poses as an adult app aimed at South Korean users and targeting Android devices only. The APK connects to a malicious website that runs XLoader in the background and uses a different fixed Twitter account. 

The researchers also discovered a variant that exploits Instagram and Tumblr instead of Twitter to hide its C&C address. 

According to Trend Micro, XLoader activity has been observed since 2018, but can be traced back to January 2015. 

The researchers linked XLoader to the FakeSpy malware, based on the deployment technique, the cloning of legitimate Japanese websites to host malicious apps, and the use of the same naming method, in addition to the abuse of social networking sites to hide the C&C address. 

Furthermore, the fake iOS profile was also found hosted on a site that has been previously linked to FakeSpy. 

Related: Cyber and Physical Convergence Opens Doors for Attackers: Report

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

Asus patched nine WiFi router security defects, including a highly critical 2018 vulnerability that exposes users to code execution attacks.