Skip to content
Up To Date Time

Up To Date Time

  • Home
  • Sports
  • cryptocurrency
  • Technology
  • Virtual Reality
  • Education Law
  • More
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
  • Toggle search form
Found: 280 Android apps that use OCR to steal cryptocurrency credentials

Found: 280 Android apps that use OCR to steal cryptocurrency credentials

Posted on August 27, 2024September 8, 2024 By rehan.rafique No Comments on Found: 280 Android apps that use OCR to steal cryptocurrency credentials

Found: 280 Android apps that use OCR to steal cryptocurrency credentials

Getty Images

Researchers have discovered more than 280 malicious apps for Android that use optical character recognition to steal cryptocurrency wallet credentials from infected devices.

The apps masquerade as official ones from banks, government services, TV streaming services, and utilities. In fact, they scour infected phones for text messages, contacts, and all stored images and surreptitiously send them to remote servers controlled by the app developers. The apps are available from malicious sites and are distributed in phishing messages sent to targets. There’s no indication that any of the apps were available through Google Play.

A high level of sophistication

The most notable thing about the newly discovered malware campaign is that the threat actors behind it are employing optical character recognition software in an attempt to extract cryptocurrency wallet credentials that are shown in images stored on infected devices. Many wallets allow users to protect their wallets with a series of random words. The mnemonic credentials are easier for most people to remember than the jumble of characters that appear in the private key. Words are also easier for humans to recognize in images.

SangRyol Ryu, a researcher at security firm McAfee, made the discovery after obtaining unauthorized access to the servers that received the data stolen by the malicious apps. That access was the result of weak security configurations made when the servers were deployed. With that, Ryu was able to read pages available to server administrators.

One page, displayed in the image below, was of particular interest. It showed a list of words near the top and a corresponding image, taken from an infected phone, below. The words represented visually in the image corresponded to the same words.

An admin page showing OCR details.<br />
Enlarge / An admin page showing OCR details.

McAfee

“Upon examining the page, it became clear that a primary goal of the attackers was to obtain the mnemonic recovery phrases for cryptocurrency wallets,” Ryu wrote. “This suggests a major emphasis on gaining entry to and possibly depleting the crypto assets of victims.”

Optical character recognition is the process of converting images of typed, handwritten, or printed text into machine-encoded text. OCR has existed for years and has grown increasingly common to transform characters captured in images into characters that can be read and manipulated by software.

Ryu continued:

This threat utilizes Python and Javascript on the server-side to process the stolen data. Specifically, images are converted to text using optical character recognition (OCR) techniques, which are then organized and managed through an administrative panel. This process suggests a high level of sophistication in handling and utilizing the stolen information.

Python code for converting text shown in images to machine-readable text.
Enlarge / Python code for converting text shown in images to machine-readable text.

McAfee

People who are concerned they may have installed one of the malicious apps should check the McAfee post for a list of associated websites and cryptographic hashes.

The malware has received multiple updates over time. Whereas it once used HTTP to communicate with control servers, it now connects through WebSockets, a mechanism that’s harder for security software to parse. WebSockets have the added benefit of being a more versatile channel.

A timeline of apps' evolution.
Enlarge / A timeline of apps’ evolution.

McAfee

Developers have also updated the apps to better obfuscate their malicious functionality. Obfuscation methods include encoding the strings inside the code so they’re not easily read by humans, the addition of irrelevant code, and the renaming of functions and variables, all of which confuse analysts and make detection harder. While the malware is mostly restricted to South Korea, it has recently begun to spread within the UK.

“This development is significant as it shows that the threat actors are expanding their focus both demographically and geographically,” Ryu wrote. “The move into the UK points to a deliberate attempt by the attackers to broaden their operations, likely aiming at new user groups with localized versions of the malware.”

Technology

Post navigation

Previous Post: 5 Key Lessons from a Sleep Tech CEO on Brand Building
Next Post: Why Businesses Must Lead the Charge in the Circular Economy

More Related Articles

What Is Cyber Security? What You Need To Know 2024 What Is Cyber Security? What You Need To Know 2024 Technology
Now PET scan prep easy Now PET scan prep easy Technology
UK Web Hosting for Startups: Essential Tips UK Web Hosting for Startups: Essential Tips Technology
Free Online Courses : The Complete React JS Course Free Online Courses : The Complete React JS Course Technology
The Ultimate Guide to Choosing the Perfect Computer Keyboard The Ultimate Guide to Choosing the Perfect Computer Keyboard Technology
Fake Android apps are being used to steal cryptocurrency wallets Fake Android apps are being used to steal cryptocurrency wallets Technology

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Apple enhances M5 iPad Pro with more cameras, thinner bezels
  • Pacquiao says he’s going to rumble some more
  • ChatGPT Analyzes ROI Potential for Shiba Inu, XRP, and Little Pepe (LILPEPE) in 2025: Here’s Where to Invest
  • Meta Researchers Reveal Compact Ultra-wide Field-of-View VR & MR Headsets
  • These are the 6 Android widgets I simply can’t live without

Categories

  • cryptocurrency
  • Education Law
  • Sports
  • Technology
  • Virtual Reality

Copyright © 2025 Up To Date Time.

Powered by PressBook Blog WordPress theme