Experts at Kaspersky Lab experts uncovered a mobile malware 'Xafecopy Trojan' targeting the Wireless Application Protocol (WAP) billing payment method, stealing money through victims' mobile accounts without their knowledge, disguised as useful apps like BatteryMaster.
The malware, which has spread to 40 percent of the Indian landscape, is said to be operating normally while secretly decrypting and loading malicious code onto the device. Some of the names in the JavaScript files used by Xafecopy are also seen in the infamous Ztorg Trojan, suggesting possible code sharing between criminal gangs.
Once activated, the Xafecopy malware clicks on web pages with WAP billing - a form of mobile payment that charges costs directly to the user's mobile phone bill so they don't need to register a card or set up a username and password - and then silently subscribes the phone to a number of services. The malware uses JavaScript files that can bypass 'captcha' systems designed to protect users by confirming the action is being performed by a human.
"WAP billing can be particularly vulnerable to so-called 'clickjacking' as it has a one-click feature that requires no user authorization. Our research suggests WAP billing attacks are on the rise. Xafecopy's attacks targeted countries where this payment method is popular. The malware has also been detected with different modifications, such as the ability to text messages from a mobile device to Premium-rate phone numbers, and to delete incoming text messages to hide alerts from mobile network operators about stolen money," said Roman Unuchek, Senior Malware Analyst, Kaspersky Lab.
Xafecopy hit more than 4,800 users in 47 countries in a span of one month, with 37.5 percent of the attacks detected and blocked by Kaspersky Lab products targeting India, followed by Russia, Turkey and Mexico.
"Android users need to be extremely cautious in how they download apps. It is best not to trust third-party apps, and whatever apps users do download should be scanned locally with the Verify Apps utility. But beyond that, Android users should be running a mobile security suite on their devices," said Altaf Halde, Managing Director- South Asia, Kaspersky Lab.
Persuading users from falling prey to the infectious malware, it is important for Android users to note that the apps they are downloading have been created by a reputable developer, and use only reputable online stores.
Further, users must keep their OS and application software up-to-date, and refrain from downloading anything that looks suspicious or whose source cannot be verified.
Disclaimer: No Business Standard Journalist was involved in creation of this content
You’ve reached your limit of {{free_limit}} free articles this month.
Subscribe now for unlimited access.
Already subscribed? Log in
Subscribe to read the full story →
Smart Quarterly
₹900
3 Months
₹300/Month
Smart Essential
₹2,700
1 Year
₹225/Month
Super Saver
₹3,900
2 Years
₹162/Month
Renews automatically, cancel anytime
Here’s what’s included in our digital subscription plans
Exclusive premium stories online
Over 30 premium stories daily, handpicked by our editors


Complimentary Access to The New York Times
News, Games, Cooking, Audio, Wirecutter & The Athletic
Business Standard Epaper
Digital replica of our daily newspaper — with options to read, save, and share


Curated Newsletters
Insights on markets, finance, politics, tech, and more delivered to your inbox
Market Analysis & Investment Insights
In-depth market analysis & insights with access to The Smart Investor


Archives
Repository of articles and publications dating back to 1997
Ad-free Reading
Uninterrupted reading experience with no advertisements


Seamless Access Across All Devices
Access Business Standard across devices — mobile, tablet, or PC, via web or app
