{"id":15402,"date":"2020-02-14T11:05:52","date_gmt":"2020-02-14T16:05:52","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/ginp-mobile-banking-trojan\/15402\/"},"modified":"2021-10-04T20:36:22","modified_gmt":"2021-10-04T16:36:22","slug":"ginp-mobile-banking-trojan","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/ginp-mobile-banking-trojan\/15402\/","title":{"rendered":"Ginp mobile Trojan fakes incoming SMS messages"},"content":{"rendered":"<p>Having infiltrated a phone, most mobile banking Trojans try to gain access to SMS messages. They do so to intercept one-time confirmation codes from banks. Armed with such a code, the malware owners can make a payment or siphon off funds without the victim noticing. At the same time, many mobile Trojans use text messages to infect more devices by sending the victim\u2019s contacts a bad download link.<\/p>\n<p>Some malicious apps are more creative, using SMS access to distribute other things in your name, such as <a href=\"https:\/\/www.kaspersky.com\/blog\/faketoken-trojan-sends-offensive-sms\/32048\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">offensive text messages<\/a>. The Ginp malware, which we <a href=\"https:\/\/twitter.com\/sh1shk0va\/status\/1186968376930897926\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">first detected last fall<\/a>, can even create incoming texts on the victim\u2019s phone that no one actually sent \u2014 and not only texts. But let\u2019s start from the beginning.<\/p>\n<h2>What Ginp mobile Trojan is capable of?<\/h2>\n<p>At first, Ginp had a fairly standard skill set for a banking Trojan. It sent all the victim\u2019s contacts to its creators, intercepted text messages, stole bank card data, and overlaid banking apps with phishing windows.<\/p>\n<p>For the latter, the malware exploited <a href=\"https:\/\/www.kaspersky.com\/blog\/android-8-permissions-guide\/23981\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Accessibility<\/a>, a set of Android features for users with visual impairments. That is not uncommon; banking Trojans and many other types of malware use these features because through them they get visual access to everything on the screen and can even \u201ctap\u201d buttons or links \u2014 in effect, they can take charge of your phone completely.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic-2\">\n<p>But Ginp\u2019s authors did not stop there, repeatedly replenishing its arsenal with more inventive capabilities. For instance, the malware started using push notifications and pop-up messages to get the victim to open certain apps \u2014 those that it can overlay with phishing windows. The notifications are cleverly worded to lull the user into expecting to see a form for entering bank card data. Below is an example (in Spanish):<\/p>\n<blockquote><p>Google Pay: Nos faltan los detalles de su tarjeta de cr\u00e9dito o d\u00e9bito. Utilice Play Store para agregarlos de manera segura.<br>\n(\u201cGoogle Pay: We are missing your credit or debit card details. Please use the Play Store app to add them securely.\u201d)<\/p><\/blockquote>\n<p>In the Play Store app, users see a form for entering card data as expected. However, it\u2019s the Trojan displaying the form, not Google Play \u2014 and the input data goes straight to the cybercriminals.<\/p>\n<div id=\"attachment_32484\" style=\"width: 372px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2020\/02\/14214604\/ginp-mobile-banking-trojan-screen-1.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-32484\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2020\/02\/14214604\/ginp-mobile-banking-trojan-screen-1.jpg\" alt=\"A fake \u2014 and unfortunately very convincing \u2014 window for entering bank card data, displayed in what appears to be the Play Store app\" width=\"362\" height=\"362\" class=\"size-full wp-image-15403\"><\/a><p id=\"caption-attachment-32484\" class=\"wp-caption-text\">A fake \u2014 and unfortunately very convincing \u2014 window for entering bank card data, displayed in what appears to be the Play Store app<\/p><\/div>\n<p>Ginp goes beyond the Play Store, also showing what appear to be notifications from banking apps:<\/p>\n<blockquote><p>B**A: Actividad sospechosa en su cuenta de B**A. Por favor, revise las ultimas transacciones y llame al 91 *** ** 26.<br>\n(\u201cB**A: Suspicious activity detected on your B**A account. Please check recent transactions and call 91 *** ** 26\u201d)<\/p><\/blockquote>\n<p>Curiously, the fake notifications provide a real phone number for the bank, so if you call, the voice at the end of the line is likely to report that your account is fine. But if you look into the \u201csuspicious transactions\u201d before calling the bank, the malware overlays the banking app with a fake window and asks for your card details.<\/p>\n<h2>Very convincing fake SMS messages<\/h2>\n<p>In early February, our Botnet Attack Tracking system detected another new feature in Ginp: the ability to create fake incoming texts. The purpose is the same as before \u2014 to get the user to open an app \u2014 but now, the Trojan can generate SMS messages with any text and seemingly from any sender. There is nothing to prevent the attackers from faking messages from banks or Google.<\/p>\n<div id=\"attachment_32483\" style=\"width: 1486px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2020\/02\/14214608\/ginp-mobile-banking-trojan-screen-2n.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-32483\" class=\"size-full wp-image-15405\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2020\/02\/14214608\/ginp-mobile-banking-trojan-screen-2n.jpg\" alt=\"A message supposedly from a bank asking the user to confirm a payment in the mobile app\" width=\"1476\" height=\"720\"><\/a><p id=\"caption-attachment-32483\" class=\"wp-caption-text\">A message, supposedly from a bank asking the user to confirm a payment in the mobile app<\/p><\/div>\n<p>Whereas users often push notifications aside without a glance, they tend to read their incoming SMS messages sooner or later. That means there\u2019s a good chance any given user will open the app to check what is happening with their account. And that\u2019s when the Trojan slips in a fake form for entering card details.<\/p>\n<h2>How to guard against Ginp<\/h2>\n<p>At present, Ginp is mainly targeting users in Spain, but its tactics have already changed once; it used to target Poland and the UK as well. So even if you live elsewhere, always remember the basic rules of cybersecurity. To avoid falling victim to banking Trojans:<\/p>\n<ul>\n<li>Download apps only from Google Play.<\/li>\n<li>Block the installation of <a href=\"https:\/\/www.kaspersky.com\/blog\/unknown-apps-android\/41656\/\" target=\"_blank\" rel=\"noopener nofollow\">programs from unknown sources<\/a> in the Android\u2019s settings. This will minimize the chances of getting some nasty app.<\/li>\n<li>Do not follow links in text messages, especially if the message seems suspicious in any way \u2014 if a friend unexpectedly texts you a link to a photo instead of sending the image in a messaging or social media app, for example. <\/li>\n<li>Do not give <em>Accessibility<\/em> permissions to any app that requests them \u2014 very few programs genuinely need this powerful permission. <\/li>\n<li>Be wary of apps that want access to your texts.<\/li>\n<li>Install a reliable security solution on your phone. For example, <a href=\"https:\/\/me-en.kaspersky.com\/mobile-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____3d7d2c33c4c17a10\" target=\"_blank\" rel=\"noopener\">Kaspersky for Android<\/a> readily detects Ginp and many other threats besides.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic\">\n","protected":false},"excerpt":{"rendered":"<p>In the hunt for your bank card info, the malware overlays apps with phishing pages and uses fake notifications to get you to open the apps.<\/p>\n","protected":false},"author":2555,"featured_media":15407,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1486],"tags":[105,702,205,2233,426,2234,46,521],"class_list":{"0":"post-15402","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-android","10":"tag-banking-trojans","11":"tag-botnets","12":"tag-ginp","13":"tag-mobile-devices","14":"tag-push-notifications","15":"tag-sms","16":"tag-threats"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ginp-mobile-banking-trojan\/15402\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ginp-mobile-banking-trojan\/18527\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/ginp-mobile-banking-trojan\/7786\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ginp-mobile-banking-trojan\/20312\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ginp-mobile-banking-trojan\/18616\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ginp-mobile-banking-trojan\/17136\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ginp-mobile-banking-trojan\/21100\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ginp-mobile-banking-trojan\/19936\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ginp-mobile-banking-trojan\/26324\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/ginp-mobile-banking-trojan\/7688\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ginp-mobile-banking-trojan\/32478\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ginp-mobile-banking-trojan\/13754\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/ginp-mobile-banking-trojan\/14457\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/ginp-mobile-banking-trojan\/12788\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ginp-mobile-banking-trojan\/22226\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ginp-mobile-banking-trojan\/26902\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/ginp-mobile-banking-trojan\/25013\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ginp-mobile-banking-trojan\/20966\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ginp-mobile-banking-trojan\/25807\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ginp-mobile-banking-trojan\/25639\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15402","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2555"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15402"}],"version-history":[{"count":5,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15402\/revisions"}],"predecessor-version":[{"id":18930,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15402\/revisions\/18930"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15407"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15402"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15402"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15402"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}