December 3, 2018 By Shane Schick 2 min read

A pair of mobile malware threats, XLoader and FakeSpy, that posed as apps from a Japanese home delivery company may be operated by or affiliated with the same group of cybercriminals, according to recent reports.

Nearly 385,000 people around the world have been affected by XLoader and FakeSpy, which are designed to steal personal information such as financial data and install other apps, according to Trend Micro. The majority of victims are based in Japan and South Korea, and data compiled up to October shows that the number of infections from the two mobile malware threats have increased dramatically since August.

The researchers attributed both XLoader and FakeSpy to a cybercriminal collective known as the Yanbian Gang.

Signs of a Possible Mobile Malware Connection

One sign that FakeSpy and XLoader might originate from the same source is a set of about 126 domains that they share as part of their deployment procedures. A closer look at the two threats revealed marked resemblances in their code, and they also attempt to hide the origins of their command-and-control (C&C) servers in similar ways.

Both threats imitated legitimate apps of a Japanese home delivery firm to dupe users into installing the mobile malware on their devices, and the domains in question were registered with phone numbers from the same Chinese province where researchers believe the Yanbian Gang is based.

That said, the report acknowledged that the two mobile malware threats may simply have been developed and deployed in similar ways, and nothing has been definitively proven yet.

How to Stay Ahead of the Threat

No matter who is behind FakeSpy and XLoader, there’s no question they follow in the footsteps of similar mobile malware campaigns that use phishing techniques to lure their victims.

In response to such threats, IBM X-Force and IBM Research in Tokyo developed an advanced approach called ahead-of-threat detection, which brings together disparate data sources to identify potentially dangerous phishing domains before cybercriminals can use them in their social engineering schemes. With ahead-of-threat detection, chief information security officers (CISOs) and their teams can build more effective blacklists and keep the likes of XLoader and FakeSpy at bay.

Source: Trend Micro

More from

Unpacking the NIST cybersecurity framework 2.0

4 min read - The NIST cybersecurity framework (CSF) helps organizations improve risk management using common language that focuses on business drivers to enhance cybersecurity.NIST CSF 1.0 was released in February 2014, and version 1.1 in April 2018. In February 2024, NIST released its newest CSF iteration: 2.0. The journey to CSF 2.0 began with a request for information (RFI) in February 2022. Over the next two years, NIST engaged the cybersecurity community through analysis, workshops, comments and draft revision to refine existing standards…

What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index?

3 min read - The IBM X-Force 2024 Threat Intelligence Index has been released. The headlines are in and among them are the fact that a global identity crisis is emerging. X-Force noted a 71% increase year-to-year in attacks using valid credentials.In this blog post, I’ll explore three cybersecurity recommendations from the Threat Intelligence Index, and define a checklist your Security Operations Center (SOC) should consider as you help your organization manage identity risk.The report identified six action items:Remove identity silosReduce the risk of…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today