Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Minister tells UK’s Turing AI Institute to focus on national defense

    July 6, 2025

    Best Early Golden Day Amazon Echo Device Deals: My 20+ Favorite Deals Available Now

    July 6, 2025

    Astronomers discover 3i/Atlas, the largest interstellar comet has not been detected

    July 6, 2025
    Facebook X (Twitter) Instagram
    NPP HUB
    • Home
    • Technology
    • Artificial Intelligence
    • Gadgets
    • Tech News
    Facebook X (Twitter) Instagram
    NPP HUB
    Home»Technology»Found: 280 Android apps that use OCR to steal cryptocurrency credentials
    Technology

    Found: 280 Android apps that use OCR to steal cryptocurrency credentials

    Daniel68By Daniel68September 9, 2024No Comments4 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    Found: 280 Android apps that use OCR to steal cryptocurrency credentials

    Getty Images

    Researchers have discovered more than 280 malicious Android apps that use optical character recognition to steal cryptocurrency wallet credentials from infected devices.

    The apps masquerade as official apps for banks, government services, TV streaming services and utilities. In reality, they scour infected phones for text messages, contacts and any stored images, then surreptitiously send them to remote servers controlled by the app developers. The apps are available from malicious websites and distributed via phishing messages sent to targets. There is no indication that any of the apps are available through Google Play.

    Highly complex

    What’s most notable about the newly discovered malware campaign is that the threat actors behind it are using optical character recognition software to try to extract cryptocurrency wallet credentials displayed in images stored on infected devices. Many wallets allow users to protect their wallets with a series of random words. For most people, mnemonic credentials are easier to remember than the jumbled characters that appear in private keys. The words in the images are also easier for humans to recognize.

    SangRyol Ryu, a researcher at security firm McAfee, discovered this after gaining unauthorized access to a server that received data stolen by the malicious application. The access was due to a weak security configuration when the server was deployed. With this, Ryu was able to read pages available to server administrators.

    One of the pages shown in the image below is particularly interesting. A list of words is displayed near the top of the page, and below it is a corresponding image taken from an infected phone. The words visually displayed in the image correspond to the same words.

    The management page showing OCR details.<br />” src=”https://cdn.arstechnica.net/wp-content/uploads/2024/09/c2-server-page-640×706.png” width=”640″ height=”706″ srcset=”https:/ /cdn.arstechnica.net/wp-content/uploads/2024/09/c2-server-page.png 2x”/><figcaption class=
    enlarge / The management page showing OCR details.

    McAfee

    “After inspecting the page, it is clear that the attacker’s primary goal is to obtain the mnemonic recovery phrase for cryptocurrency wallets,” Ryu wrote. “This suggests that their primary focus is on obtaining and potentially draining the victim’s crypto assets.”

    Optical character recognition is the process of converting images of typed, handwritten, or printed text into machine-encoded text. OCR has been around for many years and is becoming increasingly common for converting characters captured in images into characters that software can read and manipulate.

    Ryu continued:

    The threat uses Python and Javascript on the server side to process the stolen data. Specifically, the threat uses optical character recognition (OCR) technology to convert images into text, which is then organized and managed through the admin panel. This process shows that the threat is very sophisticated in processing and exploiting stolen information.

    Python code to convert the text displayed in the image into machine-readable text.
    enlarge / Python code to convert the text displayed in the image into machine-readable text.

    McAfee

    People who are concerned that they may have installed a malicious app should check out the McAfee post for a list of relevant websites and cryptographic hashes.

    The malware has been updated several times over time. It used to communicate with its control server using HTTP, but now connects via WebSockets, a mechanism that is difficult for security software to parse. WebSockets has the added benefit of being a more universal channel.

    A timeline of the application's evolution.
    enlarge / A timeline of the application’s evolution.

    McAfee

    The developers have also updated the apps to better obfuscate their malicious functionality. Obfuscation methods include encoding strings in the code to make them less readable by humans, adding irrelevant code, and renaming functions and variables, all of which confuse analysts and make detection more difficult. While the malware has been primarily confined to South Korea, it has recently begun to spread within the United Kingdom.

    “This development is significant as it shows that the threat actor is expanding its demographic and geographic reach,” Ryu wrote. “Entering the UK suggests the attackers are interested in expanding their operations, perhaps aiming to attract new user bases with localized versions of the malware.”

    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Daniel68
    • Website

    Related Posts

    Act 2 of Drive Capital – How Columbus Ventures Success After Split

    July 6, 2025

    Today’s NYT Connections: Sports Edition Tips, July 5th #285 Answers

    July 5, 2025

    Report finds racist anti-Semitic AI Tiktok clip

    July 4, 2025

    AT&T launches wireless account lockout protection to curb Sim-S-Swap Scourge

    July 3, 2025

    Internet Alpha Male Sex Hope Whites Fear Zohran Mamdani

    July 2, 2025

    Steam can now show you that the framework generation has changed your game

    July 1, 2025
    Leave A Reply Cancel Reply

    Top Reviews
    8.9
    Blog

    Smart Home Décor : Technology Offers a Slew of Options

    By Daniel68
    8.9
    Blog

    Edifier W240TN Earbud Review: Fancy Specs Aren’t Everything

    By Daniel68
    8.9
    Blog

    Review: Xiaomi’s New Mobile with Hi-fi and Home Cinema System

    By Daniel68
    mmm
    Editors Picks

    Minister tells UK’s Turing AI Institute to focus on national defense

    July 6, 2025

    Best Early Golden Day Amazon Echo Device Deals: My 20+ Favorite Deals Available Now

    July 6, 2025

    Astronomers discover 3i/Atlas, the largest interstellar comet has not been detected

    July 6, 2025

    Act 2 of Drive Capital – How Columbus Ventures Success After Split

    July 6, 2025
    Legal Pages
    • About Us
    • Disclaimer
    • DMCA Notice
    • Privacy Policy
    Our Picks

    Minister tells UK’s Turing AI Institute to focus on national defense

    July 6, 2025

    Best Early Golden Day Amazon Echo Device Deals: My 20+ Favorite Deals Available Now

    July 6, 2025

    Astronomers discover 3i/Atlas, the largest interstellar comet has not been detected

    July 6, 2025
    Top Reviews
    8.9

    Smart Home Décor : Technology Offers a Slew of Options

    January 15, 2021
    8.9

    Edifier W240TN Earbud Review: Fancy Specs Aren’t Everything

    January 15, 2021
    8.9

    Review: Xiaomi’s New Mobile with Hi-fi and Home Cinema System

    January 15, 2021

    Type above and press Enter to search. Press Esc to cancel.