Mobile Trojans Steal Users’ Money Through WAP-Billing Services

Mobile Trojan clickers that are stealing money from Android users through WAP-billing have been discovered by Kaspersky Lab researchers. The trend is becoming common with thousands of affected users in different countries across the globe.

Wireless Application Protocol (WAP) billing has been widely used by mobile network operators for paid services and subscriptions for many years. This form of mobile payment charges costs directly to the user’s mobile phone bill, without the need for bank card registration or a sign-up process. A user is usually redirected to a different web page via a button and offered a range of additional services.

By clicking on it, the user activates a subscription, and his mobile account is charged. In this current threat scenario, all of these actions can be easily implemented by a Trojan, which performs in secret and clicks on every page by itself. In addition, a simple registration of domains in a mobile operator’s billing system, allows fraudsters to relatively easy connect their website to a WAP-billing service. As a result, money from a victim’s account flows directly to the hackers’ accounts.

Kaspersky Lab detected several popular Trojan families among the “TOP 20 mobile malware programmes” using the WAP-billing service. To become active through mobile Internet, all Trojan versions are able to turn off Wi-Fi and turn on mobile data. The most popular Trojan, belonging to the Trojan-Clicker.AndroidOS.Ubsod malware family, receives URLs from its command and control server and opens them. According to KSN statistics, this Trojan infected almost 8,000 infected users from 82 countries, in July 2017.[related-posts]

Another popular mobile malware in this theft scenario uses Java Script files to click on buttons with WAP-billing. For instance, the Xafekopy Trojan, distributed through ads and masquerading as useful apps such as battery optimisers, can subscribe users to different services and steal their money. Kaspersky Lab experts also found that it shares some similarities with the Ztorg malware, which has also been recently reported by Kaspersky Lab. Like Ztorg, the Xafekopy is of Chinese-speaking origin.

Some Trojan families, such as Autosus and Podec exploit Device Administrator rights, making it harder to delete the Trojan. Moreover, by using JS files Trojans have capabilities to bypass CAPTCHA. For example, the Podec Trojan, which has been active since 2015. Based on Kaspersky Lab research it was the third most common Trojan in June 2017, among those exploiting WAP-billings, and is still active mainly in Russia.

To prevent any malicious actions and to stay protected, Kaspersky Lab advises users to be attentive to apps installed on their devices, to avoid those from unknown sources, and to always keep their device updated with the latest security protection, and also recommend users to install a reliable security solution on their device.

source: ITNews Africa


Staff Writer

All articles published by Staff Writer have been contributed by all our reporters and edited and proofread by our editorial team.
Back to top button
PC Tech Magazine

Adblock Detected

Please disable your adblocker to continue accessing this site.