Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • Former Startmate boss Michael Batko is back in founder mode building with Hourglass AI
    • Why Sharing a Screenshot Can Get You Jailed in the UAE
    • The European Commission issues preliminary DSA findings against Meta, saying Instagram and Facebook fail to prevent under-13 users from accessing the services (Gian Volpicelli/Bloomberg)
    • Today’s NYT Mini Crossword Answers for April 29
    • Turning Dumb Bombs into Cruise Missiles
    • When Elon Musk had a crack at Australia’s online safety boss, she received 60,000 abusive messages, including death threats, in 24 hrs
    • ‘It’s Undignified’: Hundreds of Workers Training Meta’s AI Could Be Laid Off
    • Alberta online gambling expansion sparks concern among First Nations casino operators
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Wednesday, April 29
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»News»Found: 280 Android apps that use OCR to steal cryptocurrency credentials
    News

    Found: 280 Android apps that use OCR to steal cryptocurrency credentials

    Editor Times FeaturedBy Editor Times FeaturedSeptember 9, 2024No Comments4 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link


    Getty Photographs

    Researchers have found greater than 280 malicious apps for Android that use optical character recognition to steal cryptocurrency pockets credentials from contaminated units.

    The apps masquerade as official ones from banks, authorities companies, TV streaming companies, and utilities. Actually, they scour contaminated telephones for textual content messages, contacts, and all saved photographs and surreptitiously ship them to distant servers managed by the app builders. The apps can be found from malicious websites and are distributed in phishing messages despatched to targets. There’s no indication that any of the apps have been obtainable by Google Play.

    A excessive stage of sophistication

    Probably the most notable factor in regards to the newly found malware marketing campaign is that the menace actors behind it are using optical character recognition software program in an try to extract cryptocurrency pockets credentials which might be proven in photographs saved on contaminated units. Many wallets permit customers to guard their wallets with a sequence of random phrases. The mnemonic credentials are simpler for most individuals to recollect than the jumble of characters that seem within the non-public key. Phrases are additionally simpler for people to acknowledge in photographs.

    SangRyol Ryu, a researcher at safety agency McAfee, made the invention after acquiring unauthorized entry to the servers that obtained the information stolen by the malicious apps. That entry was the results of weak safety configurations made when the servers have been deployed. With that, Ryu was capable of learn pages obtainable to server directors.

    One web page, displayed within the picture beneath, was of explicit curiosity. It confirmed a listing of phrases close to the highest and a corresponding picture, taken from an contaminated cellphone, beneath. The phrases represented visually within the picture corresponded to the identical phrases.

    An admin page showing OCR details.<br />
    Enlarge / An admin web page displaying OCR particulars.

    McAfee

    “Upon analyzing the web page, it grew to become clear {that a} major purpose of the attackers was to acquire the mnemonic restoration phrases for cryptocurrency wallets,” Ryu wrote. “This implies a serious emphasis on gaining entry to and presumably depleting the crypto belongings of victims.”

    Optical character recognition is the method of changing photographs of typed, handwritten, or printed textual content into machine-encoded textual content. OCR has existed for years and has grown more and more frequent to rework characters captured in photographs into characters that may be learn and manipulated by software program.

    Ryu continued:

    This menace makes use of Python and Javascript on the server-side to course of the stolen knowledge. Particularly, photographs are transformed to textual content utilizing optical character recognition (OCR) methods, that are then organized and managed by an administrative panel. This course of suggests a excessive stage of sophistication in dealing with and using the stolen data.

    Python code for converting text shown in images to machine-readable text.
    Enlarge / Python code for changing textual content proven in photographs to machine-readable textual content.

    McAfee

    People who find themselves involved they might have put in one of many malicious apps ought to examine the McAfee put up for a listing of related web sites and cryptographic hashes.

    The malware has obtained a number of updates over time. Whereas it as soon as used HTTP to speak with management servers, it now connects by WebSockets, a mechanism that’s more durable for safety software program to parse. WebSockets have the additional benefit of being a extra versatile channel.

    A timeline of apps' evolution.
    Enlarge / A timeline of apps’ evolution.

    McAfee

    Builders have additionally up to date the apps to raised obfuscate their malicious performance. Obfuscation strategies embody encoding the strings contained in the code in order that they’re not simply learn by people, the addition of irrelevant code, and the renaming of capabilities and variables, all of which confuse analysts and make detection more durable. Whereas the malware is generally restricted to South Korea, it has just lately begun to unfold inside the UK.

    “This growth is critical because it exhibits that the menace actors are increasing their focus each demographically and geographically,” Ryu wrote. “The transfer into the UK factors to a deliberate try by the attackers to broaden their operations, possible aiming at new person teams with localized variations of the malware.”



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    The European Commission issues preliminary DSA findings against Meta, saying Instagram and Facebook fail to prevent under-13 users from accessing the services (Gian Volpicelli/Bloomberg)

    April 29, 2026

    Alberta online gambling expansion sparks concern among First Nations casino operators

    April 29, 2026

    Better Markets urges courts to let states regulate prediction markets, not CFTC

    April 29, 2026

    Q&A with Sam Altman and AWS CEO Matt Garman about OpenAI’s new partnership with AWS, Bedrock Managed Agents, Trainium chips, and more (Ben Thompson/Stratechery)

    April 28, 2026

    Snapchat launches AI Sponsored Snaps, a conversational ad format in the Chat tab that lets users talk to brand-specific AI agents for product recommendations (Aisha Malik/TechCrunch)

    April 28, 2026

    AI researchers launch talkie, a 13B vintage language model trained on historical text with a 1930 cutoff, to see if it can replicate scientific breakthroughs (talkie)

    April 28, 2026

    Comments are closed.

    Editors Picks

    Former Startmate boss Michael Batko is back in founder mode building with Hourglass AI

    April 29, 2026

    Why Sharing a Screenshot Can Get You Jailed in the UAE

    April 29, 2026

    The European Commission issues preliminary DSA findings against Meta, saying Instagram and Facebook fail to prevent under-13 users from accessing the services (Gian Volpicelli/Bloomberg)

    April 29, 2026

    Today’s NYT Mini Crossword Answers for April 29

    April 29, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    Your ‘digital twin’ could pinpoint most effective cancer treatment

    October 29, 2024

    Reiter Orca ultralight carbon Mercedes Sprinter van/camper bus

    March 6, 2026

    Conveo secures €4.9 million to transform market research industry

    March 7, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.