- ICO Warns of Festive Mobile Phone Privacy Snafu
- La colaboración entre Seguridad y FinOps puede generar beneficios ocultos en la nube
- El papel del CIO en 2024: una retrospectiva del año en clave TI
- How control rooms help organizations and security management
- ITDM 2025 전망 | “효율경영 시대의 핵심 동력 ‘데이터 조직’··· 내년도 활약 무대 더 커진다” 쏘카 김상우 본부장
Loan Scam Campaign ‘MoneyMonger’ Exploits Flutter to Hide Malware
Threat actors have been exploiting the open-source user interface (UI) software kit Flutter to deploy apps with critical security and privacy risks.
The findings come from security researchers at Zimperium, who published an advisory about the new threat earlier today.
“While Flutter has been a game changer for application developers, malicious actors have also taken advantage of its capabilities and framework,” the team wrote.
In particular, the Zimperium zLabs team said it recently discovered and analyzed a Flutter application with malicious code.
The code, part of a more extensive, predatory loan malware campaign previously discovered by K7 Security Labs, uses Flutter’s framework to obfuscate malicious features and complicate the detection of malicious activity via static analysis.
“Due to the nature of Flutter, the malicious code and activity now hide behind a framework outside the static analysis capabilities of legacy mobile security products,” wrote Fernando Ortega, malware researcher at Zimperium.
Dubbed by the team as ‘MoneyMonger,’ the malicious app has not reportedly been detected in official Android stores.
“This novel malware campaign is solely distributed through third-party app stores and sideloaded onto the victim’s Android device,” Ortega explained.
According to Ortega, the new variant of the malicious loan campaign has been active since at least May 2022.
“The MoneyMonger malware uses multiple layers of social engineering to take advantage of its victims, beginning with a predatory loan scheme, promising quick money to those who follow a few simple instructions,” wrote the security researcher.
In particular, once installed, the app prompts the user to grant several permissions on the mobile endpoint to ensure they are in good standing to receive the loan.
“This gives the victim confidence to enable the very revealing local permissions on the devices, enabling the malicious actors to steal private information from the endpoint,” Ortega said.
After a device is infected, the victim is then asked to pay a certain amount to get access back to the data. If they fail to pay on time, and in some cases even after repaying the loan, the hackers will threaten to reveal information, call contacts and even send photos stolen from the device.
“This level of social engineering puts victims under increased pressure to comply, often paying more than originally agreed upon to make it stop,” Ortega added.
More information about the MoneyMonger campaign, including a list of Indicators of Compromise (IoC), is available in the Zimperium advisory.
Its publication follows an Outseer report at the end of September suggesting that most online banking fraud today results from customers being tricked into paying scammers.