{"id":162353,"date":"2022-11-30T10:41:29","date_gmt":"2022-11-30T18:41:29","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=162353"},"modified":"2023-07-11T11:23:20","modified_gmt":"2023-07-11T18:23:20","slug":"fake-security-app-found-abuses-japanese-payment-system","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fake-security-app-found-abuses-japanese-payment-system\/","title":{"rendered":"Fake Security App Found Abuses Japanese Payment System"},"content":{"rendered":"<p><span class=\"TextRun SCXW151368976 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW151368976 BCX0\" data-ccp-parastyle=\"Subtitle\">Authored by <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW151368976 BCX0\" data-ccp-parastyle=\"Subtitle\">SangRyol<\/span><span class=\"NormalTextRun SCXW151368976 BCX0\" data-ccp-parastyle=\"Subtitle\"> Ryu<\/span><span class=\"NormalTextRun SCXW151368976 BCX0\" data-ccp-parastyle=\"Subtitle\"> and Yukihiro <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW151368976 BCX0\" data-ccp-parastyle=\"Subtitle\">Okutomi<\/span><\/span><span class=\"EOP SCXW151368976 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span class=\"TextRun SCXW50785761 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW50785761 BCX0\">McAfee<\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">\u2019s<\/span> <span class=\"NormalTextRun SCXW50785761 BCX0\">Mobile <\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">Research <\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">t<\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">eam <\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">recently <\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">analyzed new<\/span><span class=\"NormalTextRun SCXW50785761 BCX0\"> malware targeting <\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">mobile payment <\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">users in Japan.<\/span><span class=\"NormalTextRun SCXW50785761 BCX0\"> The malware <\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">which<\/span><span class=\"NormalTextRun SCXW50785761 BCX0\"> was<\/span> <span class=\"NormalTextRun SCXW50785761 BCX0\">distributed on <\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">the <\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">Google Play <\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">store <\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">pretends <\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">to be<\/span> <span class=\"NormalTextRun SCXW50785761 BCX0\">a <\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">legitimate <\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">mobile security <\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">app,<\/span> <span class=\"NormalTextRun SCXW50785761 BCX0\">but<\/span><span class=\"NormalTextRun SCXW50785761 BCX0\"> it<\/span><span class=\"NormalTextRun SCXW50785761 BCX0\"> is<\/span><span class=\"NormalTextRun SCXW50785761 BCX0\"> in fact<\/span><span class=\"NormalTextRun SCXW50785761 BCX0\"> a<\/span> <span class=\"NormalTextRun SCXW50785761 BCX0\">payment <\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">fraud <\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">malware<\/span> <span class=\"NormalTextRun SCXW50785761 BCX0\">stealing <\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">passwords <\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">and abusing reverse proxy<\/span> <span class=\"NormalTextRun SCXW50785761 BCX0\">targeting the mobile payment services<\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">.<\/span> <span class=\"NormalTextRun SCXW50785761 BCX0\">McAfee<\/span> <span class=\"NormalTextRun SCXW50785761 BCX0\">researchers <\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">notified Google of<\/span><span class=\"NormalTextRun SCXW50785761 BCX0\"> the malicious apps<\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">,<\/span> <\/span><span class=\"TextRun SCXW50785761 BCX0\" lang=\"KO-KR\" xml:lang=\"KO-KR\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW50785761 BCX0\">\u30b9\u30de\u30db\u5b89\u5fc3\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<\/span><\/span><span class=\"TextRun SCXW50785761 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW50785761 BCX0\">, or \u2018Smartphone Anshin Security<\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">\u2019<\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">, package name<\/span> <span class=\"NormalTextRun SCXW50785761 BCX0\">\u2018<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW50785761 BCX0\">com.z.cloud.px.app<\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">\u2019<\/span><span class=\"NormalTextRun SCXW50785761 BCX0\"> and <\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">\u2018<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW50785761 BCX0\">com.z.px.ap<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW50785761 BCX0\">px<\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">\u2019<\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">. <\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">The applications are no longer available <\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">on Google Play. <\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">Google Play Protect<\/span><span class=\"NormalTextRun SCXW50785761 BCX0\"> has also taken steps <\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">to protect users <\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">by disabling the apps <\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">and providing<\/span><span class=\"NormalTextRun SCXW50785761 BCX0\"> a<\/span><span class=\"NormalTextRun SCXW50785761 BCX0\"> warning. <\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">McAfee Mobile Security products detect this threat as Android\/<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW50785761 BCX0\">ProxySpy<\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">.<\/span><span class=\"NormalTextRun SCXW50785761 BCX0\">\u00a0<\/span><\/span><span class=\"EOP SCXW50785761 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"1\"><span data-contrast=\"none\">How do victims install this malware?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span class=\"TextRun SCXW93571182 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW93571182 BCX0\">The malware actor <\/span><span class=\"NormalTextRun SCXW93571182 BCX0\">continues to publish <\/span><span class=\"NormalTextRun SCXW93571182 BCX0\">malicious <\/span><span class=\"NormalTextRun SCXW93571182 BCX0\">apps<\/span><span class=\"NormalTextRun SCXW93571182 BCX0\"> on <\/span><span class=\"NormalTextRun SCXW93571182 BCX0\">the <\/span><span class=\"NormalTextRun SCXW93571182 BCX0\">Google Play<\/span><span class=\"NormalTextRun SCXW93571182 BCX0\"> Store<\/span><span class=\"NormalTextRun SCXW93571182 BCX0\"> with various <\/span><span class=\"NormalTextRun SCXW93571182 BCX0\">developer<\/span> <span class=\"NormalTextRun SCXW93571182 BCX0\">accounts<\/span><span class=\"NormalTextRun SCXW93571182 BCX0\">.<\/span> <span class=\"NormalTextRun SCXW93571182 BCX0\">According to the information<\/span> <\/span><a class=\"Hyperlink SCXW93571182 BCX0\" href=\"https:\/\/twitter.com\/ozuma5119\/status\/1562100812637425664\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW93571182 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW93571182 BCX0\" data-ccp-charstyle=\"Hyperlink\">posted<\/span><\/span><\/a><span class=\"TextRun SCXW93571182 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"> <span class=\"NormalTextRun SCXW93571182 BCX0\">on Twitter <\/span><span class=\"NormalTextRun SCXW93571182 BCX0\">by <\/span><\/span><a class=\"Hyperlink SCXW93571182 BCX0\" href=\"https:\/\/twitter.com\/ozuma5119\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW93571182 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW93571182 BCX0\" data-ccp-charstyle=\"Hyperlink\">Yus<\/span><span class=\"NormalTextRun SCXW93571182 BCX0\" data-ccp-charstyle=\"Hyperlink\">u<\/span><span class=\"NormalTextRun SCXW93571182 BCX0\" data-ccp-charstyle=\"Hyperlink\">ke Osumi<\/span><\/span><\/a><span class=\"TextRun SCXW93571182 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW93571182 BCX0\">, Security Researcher at Yahoo! <\/span><span class=\"NormalTextRun SCXW93571182 BCX0\">Japan,<\/span> <span class=\"NormalTextRun SCXW93571182 BCX0\">the attacker sends<\/span> <span class=\"NormalTextRun SCXW93571182 BCX0\">SMS<\/span><span class=\"NormalTextRun SCXW93571182 BCX0\"> messages<\/span><span class=\"NormalTextRun SCXW93571182 BCX0\"> from overseas<\/span> <span class=\"NormalTextRun SCXW93571182 BCX0\">with <\/span><span class=\"NormalTextRun SCXW93571182 BCX0\">a <\/span><span class=\"NormalTextRun SCXW93571182 BCX0\">Google Play link <\/span><span class=\"NormalTextRun SCXW93571182 BCX0\">to lure <\/span><span class=\"NormalTextRun SCXW93571182 BCX0\">user<\/span><span class=\"NormalTextRun SCXW93571182 BCX0\">s<\/span><span class=\"NormalTextRun SCXW93571182 BCX0\"> to install the malware.<\/span><span class=\"NormalTextRun SCXW93571182 BCX0\"> To attract more user<\/span><span class=\"NormalTextRun SCXW93571182 BCX0\">s<\/span><span class=\"NormalTextRun SCXW93571182 BCX0\">, the message <\/span><span class=\"NormalTextRun SCXW93571182 BCX0\">en<\/span><span class=\"NormalTextRun SCXW93571182 BCX0\">tices users to update security software.<\/span><\/span><span class=\"EOP SCXW93571182 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-159027\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/sms-message-from-france.png\" alt=\"A SMS message from France (from Twitter post by Yusuke) \" width=\"472\" height=\"251\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/sms-message-from-france.png 372w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/sms-message-from-france-300x160.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/sms-message-from-france-205x109.png 205w\" sizes=\"auto, (max-width: 472px) 100vw, 472px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"NormalTextRun SCXW154894012 BCX0\">A SMS message from <\/span><span class=\"NormalTextRun SCXW154894012 BCX0\">F<\/span><span class=\"NormalTextRun SCXW154894012 BCX0\">rance<\/span><span class=\"NormalTextRun SCXW154894012 BCX0\"> (from<\/span> <span class=\"NormalTextRun SCXW154894012 BCX0\">Twitter post by <\/span><span class=\"NormalTextRun SCXW154894012 BCX0\">Yusuke<\/span><span class=\"NormalTextRun SCXW154894012 BCX0\">)<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-159041\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/malware-on-Google-play.png\" alt=\"malware on Google play\" width=\"628\" height=\"555\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/malware-on-Google-play.png 538w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/malware-on-Google-play-300x265.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/malware-on-Google-play-146x129.png 146w\" sizes=\"auto, (max-width: 628px) 100vw, 628px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW60844160 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW60844160 BCX0\">Malware on Google Play<\/span><\/span><span class=\"EOP SCXW60844160 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The Mobile Research team also found that the malware actor uses Google Drive to distribute the malware. In contrast to installing an application after downloading an APK file, Google Drive allows users to install APK files without leaving any footprint and makes the installation process simpler. Once the user clicks the link, there are only a few more touches required to run the application. Only three clicks are enough if users have previously allowed the installation of unknown apps on Google Drive.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Following notification from McAfee researchers, Google has removed known Google Drive files associated with the malware hashes listed in this blog post.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<div style=\"text-align: center;\"><iframe loading=\"lazy\" title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/ashDZzA7mho\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span><\/iframe><\/div>\n<div><\/div>\n<h2>What does this malware look like?<\/h2>\n<p><span class=\"TextRun SCXW210857877 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW210857877 BCX0\">When<\/span> <span class=\"NormalTextRun SCXW210857877 BCX0\">a user<\/span><span class=\"NormalTextRun SCXW210857877 BCX0\"> installs <\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">and <\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">launches <\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">this malware<\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">, it asks<\/span><span class=\"NormalTextRun SCXW210857877 BCX0\"> for<\/span><span class=\"NormalTextRun SCXW210857877 BCX0\"> the <\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">Service password<\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">. <\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">Cleverly, <\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">the malware shows incorrect password message<\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">s<\/span><span class=\"NormalTextRun SCXW210857877 BCX0\"> to collect <\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">the <\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">more <\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">precise <\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">password<\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">s<\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">.<\/span><span class=\"NormalTextRun SCXW210857877 BCX0\"> Of course, <\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">it <\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">does not<\/span><span class=\"NormalTextRun SCXW210857877 BCX0\"> matter <\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">whether the password is correct or not<\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">.<\/span><span class=\"NormalTextRun SCXW210857877 BCX0\"> It is <\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">a<\/span><span class=\"NormalTextRun SCXW210857877 BCX0\"> way<\/span> <span class=\"NormalTextRun SCXW210857877 BCX0\">of<\/span> <span class=\"NormalTextRun SCXW210857877 BCX0\">getting <\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">the <\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">Service password<\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">.<\/span> <span class=\"NormalTextRun SCXW210857877 BCX0\">The <\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">Service password<\/span><span class=\"NormalTextRun SCXW210857877 BCX0\"> is used for <\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">the <\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">payment service<\/span><span class=\"NormalTextRun SCXW210857877 BCX0\"> which<\/span><span class=\"NormalTextRun SCXW210857877 BCX0\"> provides easy online payment<\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">s<\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">. <\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">The user<\/span> <span class=\"NormalTextRun SCXW210857877 BCX0\">can start this payment service by setting <\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">a <\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">Service password<\/span><span class=\"NormalTextRun SCXW210857877 BCX0\">. The charge will be paid along with the mobile phone bill.\u00a0<\/span><\/span><\/p>\n<figure id=\"attachment_159069\" aria-describedby=\"caption-attachment-159069\" style=\"width: 502px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-159069\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/Interface-comparison..png\" alt=\"Interface comparison.\" width=\"502\" height=\"465\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/Interface-comparison..png 443w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/Interface-comparison.-300x278.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/Interface-comparison.-139x129.png 139w\" sizes=\"auto, (max-width: 502px) 100vw, 502px\" \/><figcaption id=\"caption-attachment-159069\" class=\"wp-caption-text\">Interface comparison.<\/figcaption><\/figure>\n<h2>How does this malware work?<\/h2>\n<p><span class=\"TextRun SCXW217009685 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW217009685 BCX0\">There is<\/span><span class=\"NormalTextRun SCXW217009685 BCX0\"> a native library named \u2018libmyapp.so\u2019 <\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">loaded <\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">during the app execution w<\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">ritten in Golang<\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">.<\/span> <span class=\"NormalTextRun SCXW217009685 BCX0\">The library<\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">, when loaded, <\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">tries to connect to<\/span><span class=\"NormalTextRun SCXW217009685 BCX0\"> the<\/span><span class=\"NormalTextRun SCXW217009685 BCX0\"> C2 server using <\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">a Web<\/span><span class=\"NormalTextRun SCXW217009685 BCX0\"> Socket.<\/span> <span class=\"NormalTextRun SCXW217009685 BCX0\">Web Application Messaging <\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">Protocol (<\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">WAMP)<\/span><span class=\"NormalTextRun SCXW217009685 BCX0\"> is used to <\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">communicate and process Remote Procedure Calls<\/span> <span class=\"NormalTextRun SCXW217009685 BCX0\">(RPC)<\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">. <\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">When <\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">the <\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">connection is made, <\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">the malware sends out network information <\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">along with <\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">the <\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">phone number. <\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">Then, <\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">it<\/span> <span class=\"NormalTextRun SCXW217009685 BCX0\">registers <\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">the <\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">client\u2019s procedure command<\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">s<\/span> <span class=\"NormalTextRun SCXW217009685 BCX0\">described in <\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">the table below<\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">.<\/span><span class=\"NormalTextRun SCXW217009685 BCX0\"> The web socket connection <\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">is kept <\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">alive and t<\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">ake<\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">s<\/span> <span class=\"NormalTextRun SCXW217009685 BCX0\">the <\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">corresponding action when <\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">the <\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">command <\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">is <\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">received from the server<\/span><span class=\"NormalTextRun SCXW217009685 BCX0\"> like an Agent<\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">.<\/span> <span class=\"NormalTextRun SCXW217009685 BCX0\">And the socket is used to <\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">send<\/span> <span class=\"NormalTextRun SCXW217009685 BCX0\">the<\/span> <span class=\"NormalTextRun SCXW217009685 BCX0\">Service password<\/span> <span class=\"NormalTextRun SCXW217009685 BCX0\">out to <\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">the <\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">attacker when<\/span><span class=\"NormalTextRun SCXW217009685 BCX0\"> the user enters the <\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">Service password<\/span><span class=\"NormalTextRun SCXW217009685 BCX0\"> on the activity<\/span><span class=\"NormalTextRun SCXW217009685 BCX0\">.<\/span><\/span><span class=\"EOP SCXW217009685 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<table data-tablestyle=\"MsoTableGrid\" data-tablelook=\"1184\" aria-rowcount=\"7\">\n<tbody>\n<tr aria-rowindex=\"1\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">RPC Function name<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Description<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"2\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">connect_to<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Create reverse proxy and connect to remote server<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"3\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">disconnect<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Disconnect the reverse proxy<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"4\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">get_status<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Send the reverse proxy status<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"5\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">get_info<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Send line number, connection type, operator, and so on<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"6\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">toggle_wifi<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Set the Wi-Fi ON\/OFF<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"7\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">show_battery_opt<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Show dialog to exclude battery optimization for background work<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span data-contrast=\"auto\">Registered RPC functions description<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<figure id=\"attachment_162383\" aria-describedby=\"caption-attachment-162383\" style=\"width: 992px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-162383 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/1labs.png\" alt=\"Initial Hello packet contains personal information\" width=\"992\" height=\"396\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/1labs.png 992w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/1labs-300x120.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/1labs-768x307.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/1labs-205x82.png 205w\" sizes=\"auto, (max-width: 992px) 100vw, 992px\" \/><figcaption id=\"caption-attachment-162383\" class=\"wp-caption-text\">Initial Hello packet contains personal information<\/figcaption><\/figure>\n<figure id=\"attachment_162397\" aria-describedby=\"caption-attachment-162397\" style=\"width: 214px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-162397 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/2labs.png\" alt=\"Sending out The Service password\" width=\"214\" height=\"149\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/2labs.png 214w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/2labs-185x129.png 185w\" sizes=\"auto, (max-width: 214px) 100vw, 214px\" \/><figcaption id=\"caption-attachment-162397\" class=\"wp-caption-text\">Sending out The Service password<\/figcaption><\/figure>\n<p><span class=\"TextRun SCXW79648923 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW79648923 BCX0\">To make a fraudulent purchase by using leaked information, the attacker needs to use the <\/span><span class=\"NormalTextRun SCXW79648923 BCX0\">user\u2019s<\/span> <span class=\"NormalTextRun SCXW79648923 BCX0\">network. The RPC command \u2018<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW79648923 BCX0\">toggle_wifi<\/span><span class=\"NormalTextRun SCXW79648923 BCX0\">\u2019 can switch the connection <\/span><span class=\"NormalTextRun SCXW79648923 BCX0\">state to Wi-Fi or cellular network<\/span><span class=\"NormalTextRun SCXW79648923 BCX0\">,<\/span><span class=\"NormalTextRun SCXW79648923 BCX0\"> and \u2018<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW79648923 BCX0\">connect_to<\/span><span class=\"NormalTextRun SCXW79648923 BCX0\">\u2019 will provide a reverse proxy to the attacker.<\/span><span class=\"NormalTextRun SCXW79648923 BCX0\"> A reverse <\/span><span class=\"NormalTextRun SCXW79648923 BCX0\">p<\/span><span class=\"NormalTextRun SCXW79648923 BCX0\">roxy <\/span><span class=\"NormalTextRun SCXW79648923 BCX0\">can <\/span><span class=\"NormalTextRun SCXW79648923 BCX0\">allow connecting <\/span><span class=\"NormalTextRun SCXW79648923 BCX0\">the host behind <\/span><span class=\"NormalTextRun SCXW79648923 BCX0\">a <\/span><span class=\"NormalTextRun SCXW79648923 BCX0\">NAT (Network Address Translation)<\/span><span class=\"NormalTextRun SCXW79648923 BCX0\"> or <\/span><span class=\"NormalTextRun SCXW79648923 BCX0\">a <\/span><span class=\"NormalTextRun SCXW79648923 BCX0\">firewall<\/span><span class=\"NormalTextRun SCXW79648923 BCX0\">.<\/span> <span class=\"NormalTextRun SCXW79648923 BCX0\">Via the proxy<\/span><span class=\"NormalTextRun SCXW79648923 BCX0\">, the attacker can send purchase requests via the <\/span><span class=\"NormalTextRun SCXW79648923 BCX0\">user\u2019s<\/span> <span class=\"NormalTextRun SCXW79648923 BCX0\">network.<\/span><\/span><span class=\"EOP SCXW79648923 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<figure id=\"attachment_162421\" aria-describedby=\"caption-attachment-162421\" style=\"width: 589px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-162421 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/Network-and-command-flow-diagram.png\" alt=\"Network and command flow diagram\" width=\"589\" height=\"302\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/Network-and-command-flow-diagram.png 589w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/Network-and-command-flow-diagram-300x154.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/Network-and-command-flow-diagram-205x105.png 205w\" sizes=\"auto, (max-width: 589px) 100vw, 589px\" \/><figcaption id=\"caption-attachment-162421\" class=\"wp-caption-text\">Network and command flow diagram<\/figcaption><\/figure>\n<h2>Conclusion<\/h2>\n<p><span data-contrast=\"auto\">It is an interesting point that the malware uses a reverse proxy to steal the user\u2019s network and implement an Agent service with WAMP. McAfee Mobile Research Team will continue to find this kind of threat and protect our customers from mobile threats. It is recommended to be more careful when entering a password or confidential information into untrusted applications.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"1\"><span data-contrast=\"none\">IoCs (Indicators of Compromise)<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">193[.]239[.]154[.]23<\/span><br \/>\n<span data-contrast=\"auto\">91[.]204[.]227[.]132<\/span><br \/>\n<span data-contrast=\"auto\">ruboq[.]com<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<table data-tablestyle=\"MsoTableGrid\" data-tablelook=\"1184\" aria-rowcount=\"7\">\n<tbody>\n<tr aria-rowindex=\"1\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">SHA256<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Package Name<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Distribution\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"2\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">5d29dd12faaafd40300752c584ee3c072d6fc9a7a98a357a145701aaa85950dd<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">com.z.cloud.px.app<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Google Play<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"3\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">e133be729128ed6764471ee7d7c36f2ccb70edf789286cc3a834e689432fc9b0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">com.z.cloud.px.app<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Other<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"4\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">e7948392903e4c8762771f12e2d6693bf3e2e091a0fc88e91b177a58614fef02<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">com.z.px.appx<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Google Play<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"5\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">3971309ce4a3cfb3cdbf8abde19d46586f6e4d5fc9f54c562428b0e0428325ad<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">com.z.cloud.px.app2<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Other<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"6\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">2ec2fb9e20b99f60a30aaa630b393d8277949c34043ebe994dd0ffc7176904a4<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">com.jg.rc.papp<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Google Drive<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"7\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">af0d2e5e2994a3edd87f6d0b9b9a85fb1c41d33edfd552fcc64b43c713cdd956<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">com.de.rc.seee<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Google Drive<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authored by SangRyol Ryu and Yukihiro Okutomi\u00a0 McAfee\u2019s Mobile Research team recently analyzed new malware targeting mobile payment users in&#8230;<\/p>\n","protected":false},"author":695,"featured_media":162368,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4136],"class_list":["post-162353","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Fake Security App Found Abuses Japanese Payment System | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Authored by SangRyol Ryu and Yukihiro Okutomi\u00a0 McAfee\u2019s Mobile Research team recently analyzed new malware targeting mobile payment users in Japan. The\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fake Security App Found Abuses Japanese Payment System | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Authored by SangRyol Ryu and Yukihiro Okutomi\u00a0 McAfee\u2019s Mobile Research team recently analyzed new malware targeting mobile payment users in Japan. The\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fake-security-app-found-abuses-japanese-payment-system\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-30T18:41:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-11T18:23:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/300x203_Blog_FakeSecurityApp.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"203\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fake-security-app-found-abuses-japanese-payment-system\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fake-security-app-found-abuses-japanese-payment-system\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Fake Security App Found Abuses Japanese Payment System\",\"datePublished\":\"2022-11-30T18:41:29+00:00\",\"dateModified\":\"2023-07-11T18:23:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fake-security-app-found-abuses-japanese-payment-system\/\"},\"wordCount\":933,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fake-security-app-found-abuses-japanese-payment-system\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/300x203_Blog_FakeSecurityApp.png\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fake-security-app-found-abuses-japanese-payment-system\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fake-security-app-found-abuses-japanese-payment-system\/\",\"name\":\"Fake Security App Found Abuses Japanese Payment System | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fake-security-app-found-abuses-japanese-payment-system\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fake-security-app-found-abuses-japanese-payment-system\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/300x203_Blog_FakeSecurityApp.png\",\"datePublished\":\"2022-11-30T18:41:29+00:00\",\"dateModified\":\"2023-07-11T18:23:20+00:00\",\"description\":\"Authored by SangRyol Ryu and Yukihiro Okutomi\u00a0 McAfee\u2019s Mobile Research team recently analyzed new malware targeting mobile payment users in Japan. The\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fake-security-app-found-abuses-japanese-payment-system\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fake-security-app-found-abuses-japanese-payment-system\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fake-security-app-found-abuses-japanese-payment-system\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/300x203_Blog_FakeSecurityApp.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/300x203_Blog_FakeSecurityApp.png\",\"width\":300,\"height\":203},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fake-security-app-found-abuses-japanese-payment-system\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Fake Security App Found Abuses Japanese Payment System\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fake Security App Found Abuses Japanese Payment System | McAfee Blog","description":"Authored by SangRyol Ryu and Yukihiro Okutomi\u00a0 McAfee\u2019s Mobile Research team recently analyzed new malware targeting mobile payment users in Japan. The","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Fake Security App Found Abuses Japanese Payment System | McAfee Blog","og_description":"Authored by SangRyol Ryu and Yukihiro Okutomi\u00a0 McAfee\u2019s Mobile Research team recently analyzed new malware targeting mobile payment users in Japan. The","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fake-security-app-found-abuses-japanese-payment-system\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2022-11-30T18:41:29+00:00","article_modified_time":"2023-07-11T18:23:20+00:00","og_image":[{"width":300,"height":203,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/300x203_Blog_FakeSecurityApp.png","type":"image\/png"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fake-security-app-found-abuses-japanese-payment-system\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fake-security-app-found-abuses-japanese-payment-system\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Fake Security App Found Abuses Japanese Payment System","datePublished":"2022-11-30T18:41:29+00:00","dateModified":"2023-07-11T18:23:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fake-security-app-found-abuses-japanese-payment-system\/"},"wordCount":933,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fake-security-app-found-abuses-japanese-payment-system\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/300x203_Blog_FakeSecurityApp.png","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fake-security-app-found-abuses-japanese-payment-system\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fake-security-app-found-abuses-japanese-payment-system\/","name":"Fake Security App Found Abuses Japanese Payment System | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fake-security-app-found-abuses-japanese-payment-system\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fake-security-app-found-abuses-japanese-payment-system\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/300x203_Blog_FakeSecurityApp.png","datePublished":"2022-11-30T18:41:29+00:00","dateModified":"2023-07-11T18:23:20+00:00","description":"Authored by SangRyol Ryu and Yukihiro Okutomi\u00a0 McAfee\u2019s Mobile Research team recently analyzed new malware targeting mobile payment users in Japan. The","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fake-security-app-found-abuses-japanese-payment-system\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fake-security-app-found-abuses-japanese-payment-system\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fake-security-app-found-abuses-japanese-payment-system\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/300x203_Blog_FakeSecurityApp.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/300x203_Blog_FakeSecurityApp.png","width":300,"height":203},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fake-security-app-found-abuses-japanese-payment-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Fake Security App Found Abuses Japanese Payment System"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/162353","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=162353"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/162353\/revisions"}],"predecessor-version":[{"id":171488,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/162353\/revisions\/171488"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/162368"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=162353"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=162353"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=162353"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=162353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}