{"id":19517,"date":"2022-04-11T14:16:11","date_gmt":"2022-04-11T10:16:11","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/fakecalls-banking-trojan\/19517\/"},"modified":"2022-04-11T14:16:52","modified_gmt":"2022-04-11T10:16:52","slug":"fakecalls-banking-trojan","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/fakecalls-banking-trojan\/19517\/","title":{"rendered":"Fakecalls: a talking Trojan"},"content":{"rendered":"<p>Cybercriminals are always coming up with ever more sophisticated malware. Last year, for example, saw the appearance of an unusual banking Trojan called Fakecalls. Besides the usual spying features, it has an interesting ability to \u201ctalk\u201d with the victim in the guise of a bank employee. There is little information about Fakecalls online, so we decided to shed some light on its capabilities.<\/p>\n<h2>Trojan in disguise<\/h2>\n<p>Fakecalls mimics the mobile apps of popular Korean banks, among them KB (Kookmin Bank) and KakaoBank. Curiously, in addition to the usual logos, the Trojan\u2019s creators display the support numbers of the respective banks on the Fakecalls screen. These phone numbers appear to be real \u2014 the number 1599-3333, for instance, can be found on the main page of the KakaoBank official website.<\/p>\n<div id=\"attachment_44074\" style=\"width: 1470px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/04\/11141620\/fakecalls-banking-trojan-screen-1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-44074\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/04\/11141620\/fakecalls-banking-trojan-screen-1.png\" alt=\"The Trojan imitates the KB (left) and KakaoBank (right) banking apps\" width=\"1460\" height=\"1280\" class=\"size-full wp-image-19518\"><\/a><p id=\"caption-attachment-44074\" class=\"wp-caption-text\">The Trojan imitates the KB (left) and KakaoBank (right) banking apps<\/p><\/div>\n<p>When installed, the Trojan immediately requests a whole host of permissions, including access to contacts, microphone and camera, geolocation, call handling, and so on.<\/p>\n<h2>Calling the bank<\/h2>\n<p>Unlike other banking Trojans, Fakecalls can imitate phone conversations with customer support. If the victim calls the bank\u2019s hotline, the Trojan discreetly breaks the connection and opens its own fake call screen instead of the regular calling app. The call appears to be normal, but in fact the attackers are now in control.<\/p>\n<p>The only thing that might give away the Trojan at this stage is the fake call screen. Fakecalls has only one interface language: Korean. This means that if another system language is selected on the phone \u2014 say, English \u2014 the victim will likely smell a rat.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/04\/11141634\/fakecalls-banking-trojan-screen-2.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/04\/11141634\/fakecalls-banking-trojan-screen-2.png\" alt=\"The standard calling app screen (left) and the Fakecalls screen (right)\" width=\"1460\" height=\"1280\" class=\"aligncenter size-full wp-image-19520\"><\/a><\/p>\n<p>After the call is intercepted, there are two possible scenarios. In the first, Fakecalls connects the victim directly with the cybercriminals, since the app has permission to make outgoing calls. In the second, the Trojan plays prerecorded audio imitating the standard greeting from the bank.<\/p>\n<div id=\"attachment_44076\" style=\"width: 690px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/04\/11141649\/fakecalls-banking-trojan-screen-3.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-44076\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/04\/11141649\/fakecalls-banking-trojan-screen-3.png\" alt=\"Fakecalls code fragment that plays prerecorded audio during an outgoing call\" width=\"680\" height=\"680\" class=\"size-full wp-image-19522\"><\/a><p id=\"caption-attachment-44076\" class=\"wp-caption-text\">Fakecalls code fragment that plays prerecorded audio during an outgoing call<\/p><\/div>\n<p>So that the Trojan maintains a realistic dialogue with the victim, the cybercriminals have recorded several phrases (in Korean) typically uttered by voicemail or call-center employees. For example, the victim might hear something like this: \u201cHello. Thank you for calling KakaoBank. Our call center is currently receiving an unusually large volume of calls. A consultant will speak to you as soon as possible. <...> To improve the quality of the service, your conversation will be recorded.\u201d Or: \u201cWelcome to Kookmin Bank. Your conversation will be recorded. We will now connect you with an operator.\u201d<\/...><\/p>\n<p>After that, the attackers, under the guise of a bank employee, can try to coax payment data or other confidential information out of the victim.<\/p>\n<p>Besides outgoing calls, Fakecalls can spoof incoming calls as well. When the cybercriminals want to contact the victim, the Trojan displays its own screen over the system one. As a result, the user sees not the real number used by the cybercriminals, but the one shown by the Trojan, such as the phone number of the bank\u2019s support service.<\/p>\n<h2>Spyware toolkit<\/h2>\n<p>In addition to mimicking telephone customer support, Fakecalls has features more typical of banking Trojans. For example, at the attackers\u2019 command, the malware can turn on the victim\u2019s phone\u2019s microphone and send recordings from it to their server, as well as secretly broadcast audio and video from the phone in real time.<\/p>\n<p>That\u2019s not all. Remember the permissions the Trojan asked for during installation? The cybercriminals can use them to determine the device\u2019s location, copy the contacts list or files (including photos and videos) from the phone to their server, and access the call and text message history.<\/p>\n<p>These permissions allow the malware not only to spy on the user, but to control their device to a certain extent, giving the Trojan the ability to drop incoming calls and delete them from the history. This allows the scammers, among other things, to block and hide real calls from banks.<\/p>\n<p>Kaspersky solutions detect this malware with the verdict Trojan-Banker.AndroidOS.Fakecalls, and safeguards the device.<\/p>\n<h2>How to stay protected<\/h2>\n<p>To prevent your personal data and money from falling into cybercriminal hands, follow these simple tips:<\/p>\n<ul>\n<li>Download apps only from official stores and <a href=\"https:\/\/www.kaspersky.com\/blog\/unknown-apps-android\/41656\/\" target=\"_blank\" rel=\"noopener nofollow\">do not allow installations from unknown sources<\/a>. Official stores run checks on all programs, and even if malware still sneaks in, it usually gets promptly removed.<\/li>\n<li>Pay attention to <a href=\"https:\/\/www.kaspersky.com\/blog\/android-8-permissions-guide\/23981\/\" target=\"_blank\" rel=\"noopener nofollow\">what permissions apps ask<\/a> for and whether they really need them. Don\u2019t be afraid to deny permissions, especially potentially dangerous ones like access to calls, text messages, accessibility and so on.<\/li>\n<li>Never give confidential information over the phone. Real bank employees will never ask for your online banking login credentials, PIN, card security code or confirmation codes from text messages. If in doubt, go to the bank\u2019s official website and find out what employees can and cannot ask about.<\/li>\n<li>Install a <a href=\"https:\/\/me-en.kaspersky.com\/plus?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener\">robust solution<\/a> that protects all your devices from banking Trojans and other malware.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-banking\">\n","protected":false},"excerpt":{"rendered":"<p>A Trojan that masquerades as a banking app and imitates phone conversations with bank employees.<\/p>\n","protected":false},"author":2624,"featured_media":19524,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[105,702,426,1825],"class_list":{"0":"post-19517","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-android","9":"tag-banking-trojans","10":"tag-mobile-devices","11":"tag-permissions"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/fakecalls-banking-trojan\/19517\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/fakecalls-banking-trojan\/24030\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/fakecalls-banking-trojan\/9859\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/fakecalls-banking-trojan\/26354\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/fakecalls-banking-trojan\/24298\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/fakecalls-banking-trojan\/24650\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/fakecalls-banking-trojan\/27063\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/fakecalls-banking-trojan\/26612\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/fakecalls-banking-trojan\/33021\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/fakecalls-banking-trojan\/10619\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/fakecalls-banking-trojan\/44072\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/fakecalls-banking-trojan\/18748\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/fakecalls-banking-trojan\/19280\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/fakecalls-banking-trojan\/15925\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/fakecalls-banking-trojan\/28447\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/fakecalls-banking-trojan\/32524\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/fakecalls-banking-trojan\/24937\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/fakecalls-banking-trojan\/30379\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/fakecalls-banking-trojan\/30147\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19517","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2624"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=19517"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19517\/revisions"}],"predecessor-version":[{"id":19523,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19517\/revisions\/19523"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/19524"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=19517"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=19517"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=19517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}