You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This pattern has been observed in campaigns abusing government-benefit themes to steal Indian UPI credentials and OTPs. Operators chain reputable platforms for delivery and resilience.
98
+
99
+
### Delivery chain across trusted platforms
100
+
- YouTube video lure → description contains a short link
101
+
- Shortlink → GitHub Pages phishing site imitating the legit portal
102
+
- Same GitHub repo hosts an APK with a fake “Google Play” badge linking directly to the file
103
+
- Dynamic phishing pages live on Replit; remote command channel uses Firebase Cloud Messaging (FCM)
104
+
105
+
### Dropper with embedded payload and offline install
106
+
- First APK is an installer (dropper) that ships the real malware at `assets/app.apk` and prompts the user to disable Wi‑Fi/mobile data to blunt cloud detection.
107
+
- The embedded payload installs under an innocuous label (e.g., “Secure Update”). After install, both the installer and the payload are present as separate apps.
108
+
109
+
Static triage tip (grep for embedded payloads):
110
+
111
+
```bash
112
+
unzip -l sample.apk | grep -i "assets/app.apk"
113
+
# Or:
114
+
zipgrep -i "classes|.apk" sample.apk | head
115
+
```
116
+
117
+
### Dynamic endpoint discovery via shortlink
118
+
- Malware fetches a plain-text, comma-separated list of live endpoints from a shortlink; simple string transforms produce the final phishing page path.
- The “Make payment of ₹1 / UPI‑Lite” step loads an attacker HTML form from the dynamic endpoint inside a WebView and captures sensitive fields (phone, bank, UPI PIN) which are `POST`ed to `addup.php`.
### Firebase Cloud Messaging (FCM) as resilient C2
181
+
- The payload registers to FCM; push messages carry a `_type` field used as a switch to trigger actions (e.g., update phishing text templates, toggle behaviours).
-[Android Malware Promises Energy Subsidy to Steal Financial Data (McAfee Labs)](https://www.mcafee.com/blogs/other-blogs/mcafee-labs/android-malware-promises-energy-subsidy-to-steal-financial-data/)
0 commit comments