August 21st, 2024

New Phishing Technique Bypasses Security on iOS and Android to Steal Bank Creds

A new phishing technique targets iOS and Android users via PWAs and WebAPKs, mimicking banking software to steal credentials. Attacks focus on users in the Czech Republic, Hungary, and Georgia.

Read original articleLink Icon
New Phishing Technique Bypasses Security on iOS and Android to Steal Bank Creds

A new phishing technique has emerged that targets users of iOS and Android devices, utilizing Progressive Web Applications (PWAs) and WebAPKs to steal banking credentials. ESET, an anti-malware vendor, has reported that cybercriminals are creating web applications that mimic legitimate banking software, allowing them to bypass security measures. On iOS, users are prompted to add the PWA to their home screens, while Android users confirm pop-ups to install the application, which appears to be from Google Play. These malicious applications do not trigger security warnings, making them difficult to detect. Once installed, users are directed to a phishing login page where they are asked to enter their banking credentials, which are then sent to the attackers' command-and-control servers. The attacks, which began around November 2023, have primarily targeted mobile banking users in the Czech Republic, with additional incidents reported in Hungary and Georgia. ESET has identified two different threat actors using this tactic and warns that the phishing campaigns may expand with more deceptive applications.

- New phishing technique targets iOS and Android users through PWAs and WebAPKs.

- Malicious applications mimic legitimate banking software, bypassing security measures.

- Users are tricked into installing these apps without security warnings.

- Attacks primarily focus on mobile banking users in the Czech Republic, Hungary, and Georgia.

- ESET warns of potential expansion of these phishing tactics by threat actors.

Link Icon 6 comments
By @lxgr - 5 months
> WebAPKs, which can be considered upgraded PWAs, appear like regular native apps and their installation does not trigger any warnings on Android devices, even if the user has not allowed installation from third-party sources.

This seems to be a mischaracterization/misunderstanding of what WebAPKs are. As far as I understand, they're merely an implementation detail of how Chrome on Android makes PWAs feel "more native": https://web.dev/articles/webapks#frequently_asked_questions

In other words, any installed PWA gets a corresponding WebAPK, and there's no actual vetting by the Play Store involved.

I don't really understand the point of that, and there seem to be significant security downsides (via user confusion, as demonstrated here), but I don't know the details, and there's probably a technical reason why Google did it this way.

By @Pfhortune - 5 months
PWA as a mechanism for delivering phishing apps is an interesting avenue. I would have thought the hoops Android/iOS make you jump through to add a PWA would be enough to make people question whether they are doing the right thing. The fact that folks did not find it odd that they had to do a particular dance to install the "app" from the "app store" is just... tragic.

I do not know what education is like where this campaign seems to have taken place (Czech Republic), but really basic tech literacy should be taught in schools. I know it's tricky to teach someone to be tech literate with a moving target like evolving tech, but we should be _trying_.

By @coolspot - 5 months
That is why we can’t have nice things. Apple will surely point to this situation as a justification for the AppStore.
By @CatWChainsaw - 5 months
This reinforces my decision to never do my banking on my phone.
By @isodev - 5 months
Why is this a "new" technique? The "this looks like your bank/legitimate app/website" scheme has been around for a very long time.