December 3, 2018 By Shane Schick 2 min read

A pair of mobile malware threats, XLoader and FakeSpy, that posed as apps from a Japanese home delivery company may be operated by or affiliated with the same group of cybercriminals, according to recent reports.

Nearly 385,000 people around the world have been affected by XLoader and FakeSpy, which are designed to steal personal information such as financial data and install other apps, according to Trend Micro. The majority of victims are based in Japan and South Korea, and data compiled up to October shows that the number of infections from the two mobile malware threats have increased dramatically since August.

The researchers attributed both XLoader and FakeSpy to a cybercriminal collective known as the Yanbian Gang.

Signs of a Possible Mobile Malware Connection

One sign that FakeSpy and XLoader might originate from the same source is a set of about 126 domains that they share as part of their deployment procedures. A closer look at the two threats revealed marked resemblances in their code, and they also attempt to hide the origins of their command-and-control (C&C) servers in similar ways.

Both threats imitated legitimate apps of a Japanese home delivery firm to dupe users into installing the mobile malware on their devices, and the domains in question were registered with phone numbers from the same Chinese province where researchers believe the Yanbian Gang is based.

That said, the report acknowledged that the two mobile malware threats may simply have been developed and deployed in similar ways, and nothing has been definitively proven yet.

How to Stay Ahead of the Threat

No matter who is behind FakeSpy and XLoader, there’s no question they follow in the footsteps of similar mobile malware campaigns that use phishing techniques to lure their victims.

In response to such threats, IBM X-Force and IBM Research in Tokyo developed an advanced approach called ahead-of-threat detection, which brings together disparate data sources to identify potentially dangerous phishing domains before cybercriminals can use them in their social engineering schemes. With ahead-of-threat detection, chief information security officers (CISOs) and their teams can build more effective blacklists and keep the likes of XLoader and FakeSpy at bay.

Source: Trend Micro

More from

Cybersecurity dominates concerns among the C-suite, small businesses and the nation

4 min read - Once relegated to the fringes of business operations, cybersecurity has evolved into a front-and-center concern for organizations worldwide. What was once considered a technical issue managed by IT departments has become a boardroom topic of utmost importance. With the rise of sophisticated cyberattacks, the growing use of generative AI by threat actors and massive data breach costs, it is no longer a question of whether cybersecurity matters but how deeply it affects every facet of modern operations.The 2024 Allianz Risk…

Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future

3 min read - As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is where the idea of autonomous security for cloud (ASC) comes into play.Security and compliance aren't just technical buzzwords; they are crucial for businesses of all sizes. With data breaches and cyber threats on the rise, having systems that ensure your…

Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity

4 min read - Nation-state adversaries are changing their approach, pivoting from data destruction to prioritizing stealth and espionage. According to the Microsoft 2023 Digital Defense Report, "nation-state attackers are increasing their investments and launching more sophisticated cyberattacks to evade detection and achieve strategic priorities."These actors pose a critical threat to United States infrastructure and protected data, and compromising either resource could put citizens at risk.Thankfully, there's an upside to these malicious efforts: information. By analyzing nation-state tactics, government agencies and private enterprises are…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today