Is Your Bank App A FAKE? Beware the New Fake CaII Malwaren

Is Your Bank App A FAKE? Beware the New Fake CaII Malwaren

In Security
275
25
7
Circulating on Android devices, the FakeCall malware now redirects your banking calls to criminals who utilize voice phishing (vishing) to extract private information. This updated version even has the means to gain access to real-time audio and video feeds. It Skirt Detection as Banking Applications. Read further to find out how to recognize and avoid these kinds of problems in the future.

A new version of the FakeCall malware for Android may redirect your bank calls to cybercriminals. FakeCall is a banking trojan that uses voice phishing by impersonating banks in fraudulent calls to obtain sensitive information from victims. This malware could also access the infected devices' live audio and video streams. This was first discovered by Kaspersky in 2022, the new version of FakeCall was recently updated with new features.


The cybersecurity firm Zimperium recently found the new version of FakeCall, which uses a technique called ‘Vishing’ and is a short form for voice phishing. It involves making fake phone calls or sending voice messages to users and hoaxing victims into sharing sensitive information such as credit card numbers, login infos, and other banking details.


One of the most insidious features of FakeCall is its ability to evade detection. It uses a variety of techniques to avoid being flagged by security software, including using multiple app names to appear as legitimate banking apps. As a result, it can be difficult for users to recognize that their device has been compromised

fake call flowchat

FakeCall can also be distributed through third-party app stores or unverified download links. Since the app is often disguised as a legitimate banking app, users may download it without realizing the risk. Some versions of FakeCall may be bundled with other fake financial apps, appearing as banking tools like account checkers, loan applications, or budgeting aids. These apps are designed to look legitimate, often copying logos and interfaces from well-known financial institutions, so users may not suspect anything amiss. Users often trust apps that they think are related to their financial activities. By impersonating well-known brands, the Trojan leverages this trust to bypass cautious behavior that might otherwise prevent installation, such as checking app permissions or downloading only from official app stores. Android users not aware of the presence of danger download and install an APK file on their phone, FakeCall asks users to set itself as the default dialer app. Obtaining the required permission, the malware gets control over the user's device using the Accessibility service and takes notes of all outgoing and incoming calls. Subsequently, FakeCall versions tricked users into calling scammers by showing a fake bank screen with the bank’s real number. Users often trust apps that they think are related to their financial activities. By impersonating well-known brands, the Trojan leverages this trust to bypass cautious behavior that might otherwise prevent installation, such as checking app permissions or downloading only from official app stores.


Once FakeCall identifies which financial institution the victim uses, attackers may initiate vishing scams, where they call the victim impersonating a bank representative, and attempt to convince them to provide further personal information or perform actions that give the attackers access to the victim's financial accounts.
Note

For instance, the attacker might claim there is an issue with the victim’s bank account, prompting them to “verify” information or install additional malware to fix the problem.


In the latest version, FakeCall sets itself as the default call handler upon installation, controlling all outgoing calls. Upon detecting specific events (i.e., TYPE_WINDOW_STATE_CHANGED), it can automatically grant permissions for the malware, bypassing user consent. Finally, the malware could give remote attackers take full control of the victim’s device UI, allowing them to simulate user interactions, such as clicks, gestures, and navigation across apps. This capability enables the attacker to manipulate the device with precision.


FakeCall may use encryption or other obfuscation methods to hide its malicious code from security software. The malware may disguise itself under multiple names or update itself to avoid detection by known virus definitions. Since it manipulates system-level functions (like the call handler), FakeCall operates in a way that is often hidden from the average user. It may not show up in the app drawer or appear as an unusual process in task managers, making it harder to spot. FakeCall often gains full control over the device by requesting broad permissions during installation, such as the ability to manage calls, access contacts, and even record phone conversations. Once it has these permissions, it becomes much more difficult for users to detect the intrusion without advanced diagnostic tools.

Ways to protect Your Data

To prevent your data and money from cybercriminals, follow these easy points:

  • Do not share confidential information over the phone. Actual bank employees will never ask for your online banking login infos, PIN, card security code, or OTP from text messages. If in doubt, go to the bank’s official website and find out what employees can and cannot ask about.
  • Pay attention to what permission apps ask for and don’t be afraid to deny permissions, especially potentially dangerous ones such as *access to calls, *text *messages, *accessibility and so on.
  • If possible install a powerful app that protects all your smartphone from banking Trojans and other malware.
  • Download necessary apps or files merely from official stores and do not allow installation from unknown sources.

By understanding how FakeCall operates, the dangers it poses, and the ways it can be avoided, you can better protect yourself from falling victim to this sophisticated Trojan. Always be cautious when downloading apps and granting permissions, especially when it comes to financial transactions or sensitive information.

Frequently Asked Questions (FAQs)

Q.
A.
Is this really a virus?
There are many dishonest developers who copy apps like your bank's apps or various other apps and make all the arrangements to get your ID and password inside them, so yes, it is definitely real.