Security Alert: Mazar BOT Infects Users in Denmark and Italy [Updated]
This is the type of SMS that you should delete without reading (and definitely without clicking!)
A new Mazar BOT campaign is currently targeting Android users in Denmark and Italy. Attackers are spoofing trustworthy organizations to infected Android smartphones.
In Denmark, potential victims are receiving the SMS below:
The SMS instructs the receiver the following:
Your package is available for pick up. Follow link to see all the information on your package:
Once clicked, the shortened link leads to www[.]fhsinsaat.com/apk/post.apk (sanitized by Heimdal Security), which downloads an Android app installation file onto the victim’s smartphone.
Cyber criminals often use shortened URLs to hide the final destination of their malicious links. Because users trust URL shortners (bit.ly being one of the most famous), they might click without thinking twice or contemplating the possibility of a cyber attack.
As for the [http://]fhsinsaat.com/ domain (sanitized by Heimdal Security), which hosts the infected file, only Bitdefender sees it as a malware site, so the detection rate is very low: only 1/67 on VirusTotal.
This new campaign aims to spread the Mazar BOT malware that sprawled across Europe and beyond earlier this year, in February 2016. The change is that, this time, the code is obfuscated and it’s a lot more difficult to analyze. The cyber criminals who created Mazar BOT must have learnt from previous campaigns and wanted to make it even more challenging for law enforcement and cyber security specialists to dissect the malicious code.
So far, this new Mazar BOT campaign has infected almost 400 Android devices in Denmark and 1500 in Italy.
For those who haven’t read about Mazar BOT yet, you should know that, once installed, it has the ability to:
- write, send, receive and read SMS
- access Internet connections
- access the state of the network that the device is connected to
- call phones
- erase the phone it’s installed on and many more.
The same as in the Mazar BOT campaign we announced in February, the malware can’t be installed on smartphones running Android with the Russian language option. So we can easily infer where the makers of Mazar BOT come from.
Mobile malware – bigger and more aggressive
Unfortunately, awareness about Android malware attacks is still low and people tend to expose themselves to attacks by clicking unknown and unrequested links. According to a recent study:
97% of malware focuses the Android operating system
In September 2015, Google announced that there are 1.4 billion active Android devices in the world. So it shouldn’t come as a surprise that cyber criminals are trying to exploit vulnerabilities and cash out on this huge potential market.
Because Google’s Play store is much more accessible for app developers, cyber criminals can use this flexibility for their malicious purposes. And there are over a thousand known malware families already, which focus on Google’s mobile OS.
In this particular campaign, attackers try to gain the victims’ trust by spoofing Post Denmark’s identity, a trusted company which Danes are completely familiar with.
Post Nord and Post Denmark were often used as bait for cyber attacks in the past 6 months. We’ve reported on these spam campaigns before, as they sent thousands of spam emails trying to infected victims with ransomware such as CryptoLocker.
Using these trusted organizations to disguise their attacks must have proved to be very effective for cyber criminals, because they continue to aggressively pursue this tactic, which they’re now applying on smartphones running Android.
Since the campaign is currently under way, we might return with more details related to the infection, but this has the potential to become a global campaign.
Top 6 Essential Protection Tips against Mobile Malware
Smartphone security is an increasingly important subject, but you can start with these 6 must-have security measures:
1. NEVER click on links in SMS or MMS messages on your smartphone. This is a rule of thumb you should follow at all times. As you’ve seen, Android devices are more vulnerable than you realize, and current security solutions for the platform are not nearly as effective as we need them to be. So keep that FOMO (Fear of Missing Out) in check and use the web to navigate directly into the account you need to get the information from.
2. Go to Settings > Security and make sure this option is turned OFF: „Unknown Sources – Allow installation of apps from sources other than the Google Play store.”
This ensures that no app will be installed on your phone, unless it comes from the Google Play store. It goes without saying that you should never install apps that aren’t in the Play store, right?
3. Install a top antivirus for the Android operating system. Don’t expect mobile AV to handle all the security challenges, but use it as a security layer for your phone’s safety. Top-rated options are readily available for you to test them.
4. Never use unknown and unsecured Wi-Fi hotspots. No matter how strong temptation is, resist the urge to connect to potentially dangerous Wi-Fi networks. Cyber criminals are very skilled at using unsecured networks to hack people’s phones. Maybe you can use these Wi-Fi protection steps we outlined. Also, keep your Wi-Fi turned OFF when you don’t use it.
5. Install a VPN on your smartphone and use it at all times. You’ll get extra security and extra privacy by doing so.
6. Train yourself to be careful all the time. With almost 1.5 billion Android devices worldwide (if not more), smartphone security will have to exponentially increase its development speed to keep up. So far, the security industry is lagging behind, so Android users have to train themselves to protect their devices and, most of all, the data stored on them.
And there’s even more you can do, so we recommend you go over the smartphone security guide we published a short while ago (for situations just like these) and apply the recommendations included in it.
* This article features cyber intelligence provided by CSIS Security Group researchers.