home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 2,033 of 2,445   
   Mike Powell to All   
   Hackers observed injectin   
   05 Dec 25 10:41:56   
   
   TZUTC: -0500   
   MSGID: 1790.consprcy@1:2320/105 2d983a42   
   PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   FORMAT: flowed   
   Hackers observed injecting legitimate banking apps with malicious code   
      
   Date:   
   Fri, 05 Dec 2025 14:50:00 +0000   
      
   Description:   
   Poisoned apps are lurking on the internet, so make sure to double-check your   
   sources before downloading anything.   
      
   FULL STORY   
      
   Hackers are tricking people into downloading poisoned mobile banking apps,   
   stealing their login credentials, monitoring their activity, and in many    
   cases - enabling financial fraud.    
      
   This is according to cybersecurity researchers Group-IB who, in a recent   
   report, said that the group is most likely GoldFactory, known for stealing   
   facial recognition data and targeting companies and consumers in the   
   Asia-Pacific region.    
      
   The first stage of the process is to decompile a legitimate banking app. This   
   allows the attackers to add code of their own, usually a remote-accessed   
   trojan or a form of backdoor . Then, they recompile the app, and create a   
   landing page that, in most respects, is identical to the authentic one.    
      
   Sophisticated banking fraud   
      
   From there, they engage in targeted social-engineering campaigns,   
   impersonating local governments, or different service providers, the   
   researchers said. In other words, the attackers create convincing phishing   
   lures, tricking people into visiting fake government and service provider   
   websites, and sideloading these poisoned applications.    
      
   The worst part is that the app, on the surface, behaves as it is supposed to,   
   convincing the victims and making them oblivious to what is happening in the   
   background.    
      
   GoldFactory uses a suite of advanced hooking malware families  including   
   SkyHook, FriHook, PineHook and Gigabud variants  to bypass app-integrity   
   checks, hide malicious activity, and take full control of infected devices.   
   These tools allow attackers to capture sensitive data, automate on-screen   
   actions, and even remotely view and operate the victims phone, Group-IB   
   explained.    
      
   While the focus so far is on Asia-Pacific, the approach enabled rapid   
   deployment across countries, it was said. Tens of thousands of users, and   
   dozens of financial institutions, are therefore exposed to high-impact    
   banking fraud.    
      
   Craig Jones, former Cybercrime Director at Interpol, recently spoke about   
   GoldFactory on an episode of Masked Actors, and said its modus operandi is   
   sophisticated banking fraud.    
      
    TechRadar Pro first reported on GoldFactory in mid-February 2024, when   
   Gold-IB discovered GoldPickaxe , a trojan that steals biometric data and uses   
   it to generate convincing deepfakes which can later be used to break into   
   mobile banking applications.    
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/hackers-observed-injecting-legitimate-b   
   anking-apps-with-malicious-code   
      
   $$   
   --- SBBSecho 3.28-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 134 206 300 307 317 400 426 428 470   
   SEEN-BY: 229/664 700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 633/280 712/848 902/26 2320/0 105 304 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca