To be frank, it is a well-executed copy of the legitimate Clubhouse website. On the official ESET blog, Stefanko said: The BlackRock Trojan can steal credentials for over 450 other apps, including Twitter, Facebook, Amazon, Netflix, eBay, and Coinbase, along with numerous popular banking apps, trading apps, cryptocurrency exchanges, cryptocurrency wallets, and more. What they're actually downloading is the BlackRock Trojan horse malware.
FAKE APP ATTACK ANDROID
Android users desperate to use Clubhouse are downloading a fake version of the app mocked up to mimic the original. As yet, Clubhouse is not available to Android devices, although an Android-version of the app is currently in the works.Ĭurrently, no such app exists. The malware is masquerading as the invite-only Clubhouse app, which is currently only available to iOS.įake Android Clubhouse App Stealing CredentialsĮSET security researcher Lukas Stefanko found the fake Clubhouse app, which isn't available on the Play Store. It'll show you the website's certificate to authenticate whether the page you have visited is legitimate.Android users beware: a fake Clubhouse Android app is stealing credentials from other apps using the BlackRock malware. If you're logging in to your account from a browser, always check the address bar for the "green lock" icon. ipa (iOS) files are not screened by any third party, posing an immediate risk to your phone and its data. And with cryptocurrencies, it becomes an exponentially difficult task.Įxperts always recommend installing apps from trusted sources like Google's Play Store or Apple's App Store. With the vast global financial system, it becomes near impossible for authorities to track down the source. Many of them believed they were buying or investing in a cryptocurrency, but in reality, their savings simply got siphoned off to an obscure bank account overseas. Servers accessed by Sophos revealed the scammers had collected KYC (Know Your Customer) documents from individuals who resided in Malaysia, South Korea, China, Japan, and India. The security firm is confident that these apps are a part of a single extensive operation. What's worse is, these apps had a legitimate customer support function that helped users transfer their money to banks in Hong Kong.
Once the fake app was installed, users would mention their existing account details, allowing the scammers to steal money from the real account.
FAKE APP ATTACK FREE
Modus operandi was "driven by the recent significant rise in the value ofĬryptocurrencies and interest in low-cost or free stock trading."įor example, researchers identified an instance in which an attacker found a victim on a dating app and eventually manipulated him into installing a fake app. Jagadeesh Chandraiah, a senior threat researcher at Sophos, said that this Identified 167 counterfeit Android and iOS apps used by attackers to steal money from people who believe they have installed financial trading, banking, or cryptocurrency apps from a trusted organization.Īfter the victim installs the application, the researcher said that the scammers would convince the victims about investing in cryptocurrencies.