October 18, 2016 By Douglas Bonderud 3 min read

Just when it seems like malware-makers have reached the end of their ingenuity, something like the Acecard Android Trojan pops up to remind security professionals that cybercriminals aren’t out of ideas — they’re just working on new projects.

According to SC Magazine, this one could pose a serious problem. Designed to run in the background, Acecard monitors when users open specific apps, then asks them to take a selfie while holding their ID. So far, the code has only been spotted in Singapore and Hong Kong, but with such a lucrative potential payout, it’s a safe bet Acecard is eventually coming to America.

Say Cheese!

So how does this app convince users to give up highly personal data and then take pictures of themselves while holding their IDs? As noted by Softpedia, the first step involves sneaking onto Android devices.

A previous version of the Trojan used a Black Jack app from the official Google Play store. The search giant cracked down, but the Trojan is now making the rounds on third-party sites, hiding in apps that claim to be Flash players or adult-content delivery systems. By masquerading as a legitimate service, this malware gains the ability to ask for admin permissions once installed on any Android device.

Of course, asking for permission isn’t the same as getting carte blanche, so how are cybercriminals convincing users to say yes? Constant annoyance appears to be the method of choice, with users being continually bombarded with permission-request screens until they finally give in and accept.

The Android Trojan is then free to scan for specific apps that require user authentication to open — such as Google Play, Facebook or Dropbox — and start asking for details. First up are requests for credit card data, along with the user’s name, birthday and address. But that’s just the beginning.

Victims are also asked to take a picture of the front and back of their ID card or passport, in addition to a selfie that shows them holding up the same ID. From the user’s perspective, this is a rather laborious verification process; for malicious actors, it’s a gold mine.

An Android Trojan’s Mass Appeal?

Once attackers have this kind of personal data in hand, it’s possible to do just about anything — open a bank or credit card account, transfer funds or take control of social media accounts. This brings up an interesting point: With so much at stake, why would users be willing to enter this kind of personal information?

The answer lies in ubiquity. Smartphone use now outpaces traditional desktop internet access in many countries thanks to the falling price of devices and increasing availability of Wi-Fi hot spots. As a result, many users simply aren’t aware of the risks surrounding third-party app sellers and assume any legitimate-seeming request for data must be real.

Consider the Ghost Push Trojan. As noted by ZDNet, this was a big deal two years ago, infecting 600,000 Androids per day and allowing the Android malware to install apps, display advertisements and spy on users. Newer versions of the mobile OS fixed the problem, but despite the roll out, over 50 percent of users still haven’t upgraded and remain at risk. Any device running Android Lollipop is vulnerable.

The takeaway? Malware-makers are counting on the masses — users who own smartphones or tablets but don’t keep up with the latest in security news, leaving them unaware of emerging threats or the benefit offered by OS upgrades. While user education is part of the solution, the sheer number of smartphones in use and the amount of money on the table makes this a high priority for phone manufacturers and Google’s OS. In a world obsessed with selfies, vanity has now become the newest threat vector.

More from

Unpacking the NIST cybersecurity framework 2.0

4 min read - The NIST cybersecurity framework (CSF) helps organizations improve risk management using common language that focuses on business drivers to enhance cybersecurity.NIST CSF 1.0 was released in February 2014, and version 1.1 in April 2018. In February 2024, NIST released its newest CSF iteration: 2.0. The journey to CSF 2.0 began with a request for information (RFI) in February 2022. Over the next two years, NIST engaged the cybersecurity community through analysis, workshops, comments and draft revision to refine existing standards…

What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index?

3 min read - The IBM X-Force 2024 Threat Intelligence Index has been released. The headlines are in and among them are the fact that a global identity crisis is emerging. X-Force noted a 71% increase year-to-year in attacks using valid credentials.In this blog post, I’ll explore three cybersecurity recommendations from the Threat Intelligence Index, and define a checklist your Security Operations Center (SOC) should consider as you help your organization manage identity risk.The report identified six action items:Remove identity silosReduce the risk of…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today