{"id":11832,"date":"2024-10-03T16:14:49","date_gmt":"2024-10-03T10:44:49","guid":{"rendered":"https:\/\/reconcybersecurity.com\/blogs\/?p=11832"},"modified":"2024-10-03T16:14:51","modified_gmt":"2024-10-03T10:44:51","slug":"how-fake-trading-apps-and-phishing-sites-are-defrauding-investors-in-2024","status":"publish","type":"post","link":"https:\/\/reconcybersecurity.com\/blogs\/how-fake-trading-apps-and-phishing-sites-are-defrauding-investors-in-2024\/","title":{"rendered":"How Fake Trading Apps and Phishing Sites Are Defrauding Investors in 2024"},"content":{"rendered":"\n<p><strong>Massive Fraud Campaign Exploits Fake Trading Apps and Phishing Sites<\/strong><\/p>\n\n\n\n<p>A large-scale fraud scheme has been uncovered by cybersecurity experts at <strong>Group-IB<\/strong>, revealing how fake trading apps on both the <strong>Apple App Store<\/strong> and <strong>Google Play Store<\/strong>, alongside phishing sites, have been used to scam victims globally. The scheme, often referred to as <strong>pig butchering<\/strong>, targets unsuspecting individuals by tricking them into fake <a href=\"https:\/\/reconcybersecurity.com\/blogs\/top-cryptocurrency-security-most-protecting-your-digital-assets-in-2023-recon-cyber-security-cyber-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">cryptocurrency <\/a>or financial investments after gaining their trust, usually through romantic or professional ruses.<\/p>\n\n\n\n<h3 id=\"how-the-scam-works-from-romance-to-financial-deception\" class=\"wp-block-heading\">How the Scam Works: From Romance to Financial Deception<\/h3>\n\n\n\n<p>This <strong><a href=\"https:\/\/www.wired.com\/story\/pig-butchering-scam-invasion\/\" target=\"_blank\" rel=\"noreferrer noopener\">social engineering scam<\/a><\/strong> involves luring victims into fraudulent investment opportunities. The criminals behind these fake apps, posing as romantic partners or financial advisors, convince users to invest in crypto or other financial instruments. Once the money is invested, it\u2019s virtually impossible for the victims to recover their funds, with some being asked to pay additional fees before being allowed to withdraw, which never happens.<\/p>\n\n\n\n<h3 id=\"the-global-reach-of-fake-trading-apps\" class=\"wp-block-heading\">The Global Reach of Fake Trading Apps<\/h3>\n\n\n\n<p>Headquartered in Singapore, <strong>Group-IB<\/strong> noted that this fraudulent campaign affects victims across the <strong>Asia-Pacific (APAC)<\/strong>, <strong>Europe<\/strong>, the <strong>Middle East<\/strong>, and <strong>Africa<\/strong>. The malicious apps, created using the <strong>UniApp Framework<\/strong>, have been named <strong>UniShadowTrade<\/strong> by researchers. This activity has been ongoing since mid-2023, using promises of quick financial returns to lure in victims. One of the most alarming findings is that a fake app,<a href=\"https:\/\/app.sensortower.com\/overview\/6560118030\" target=\"_blank\" rel=\"noreferrer noopener\"> <strong>SBI-INT<\/strong><\/a>, even bypassed <strong>Apple\u2019s App Store review<\/strong>, giving it an illusion of legitimacy.<\/p>\n\n\n\n<p>The app, which posed as software for mathematical formulas and 3D graphics calculations, used deceptive tactics such as triggering a fake interface if accessed before <strong>July 22, 2024<\/strong>. Despite being taken down, the cybercriminals continued distributing the app via phishing websites for both <strong>iOS<\/strong> and <strong>Android<\/strong> devices.<\/p>\n\n\n\n<h3 id=\"phishing-websites-and-fake-app-distribution\" class=\"wp-block-heading\">Phishing Websites and Fake App Distribution<\/h3>\n\n\n\n<p>For <strong>iOS<\/strong> users, the fake trading app is installed after downloading a <strong>.plist<\/strong> file, which requires manually trusting an <strong>Enterprise developer profile<\/strong> to make the app functional. Once installed, users are prompted to enter login details, including their phone number and password, followed by an invitation code, suggesting the attackers target specific victims.<\/p>\n\n\n\n<p>After registration, victims are taken through a six-step process where they are asked to submit personal information, job details, and identity documents, leading them to invest in fraudulent schemes. The app is designed to display fake profits, tricking users into investing more, only to block withdrawal requests later.<\/p>\n\n\n\n<h3 id=\"cybercriminals-sophisticated-tactics\" class=\"wp-block-heading\">Cybercriminals\u2019 Sophisticated Tactics<\/h3>\n\n\n\n<p>The threat actors behind these scams employed sophisticated techniques, including using a configuration that links to a legitimate service, <strong>TermsFeed<\/strong>, for generating privacy policies. This tactic helps them avoid detection and make the scam appear more credible. The fraudulent activity includes web-based elements that further conceal the malicious intent, making it harder for traditional detection systems to flag the app as suspicious.<\/p>\n\n\n\n<p><strong>Group-IB<\/strong> also discovered additional fraudulent apps on the <strong>Google Play Store<\/strong>, such as <strong>FINANS INSIGHTS<\/strong> and <strong>FINANS TRADER6<\/strong>, which primarily targeted users in <strong>Japan<\/strong>, <strong>South Korea<\/strong>, <strong>Cambodia<\/strong>, <strong>Thailand<\/strong>, and <strong>Cyprus<\/strong>. These apps were downloaded fewer than 5,000 times, but the impact on victims has been devastating.<\/p>\n\n\n\n<h3 id=\"how-to-protect-yourself-from-fake-trading-apps\" class=\"wp-block-heading\">How to Protect Yourself from Fake Trading Apps<\/h3>\n\n\n\n<p>Cybercriminals are exploiting the trust users place in app stores like Apple and Google to distribute malware disguised as legitimate trading apps. Users should remain vigilant and follow these safety tips:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Be cautious of unsolicited messages from strangers on social media or dating platforms.<\/li>\n\n\n\n<li>Verify the legitimacy of any investment platform before committing funds.<\/li>\n\n\n\n<li>Thoroughly research app publishers, ratings, and user reviews before downloading apps.<\/li>\n\n\n\n<li>Avoid clicking on suspicious links or installing apps from untrusted sources.<\/li>\n<\/ul>\n\n\n\n<p>Cybersecurity experts warn that scams like these will likely continue to evolve, making it essential for users to stay informed and take proactive steps to protect their financial and personal information.<\/p>\n","protected":false},"excerpt":{"rendered":"Massive Fraud Campaign Exploits Fake Trading Apps and Phishing Sites A large-scale fraud scheme has been uncovered by&hellip;\n","protected":false},"author":1,"featured_media":11833,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[2326],"tags":[886,56,2577,2575],"class_list":{"0":"post-11832","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-blogs","8":"tag-phishing-attacks","9":"tag-phishing-tool","10":"tag-trading-apps","11":"tag-trading-fraud"},"_links":{"self":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/11832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/comments?post=11832"}],"version-history":[{"count":1,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/11832\/revisions"}],"predecessor-version":[{"id":11834,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/11832\/revisions\/11834"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media\/11833"}],"wp:attachment":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media?parent=11832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/categories?post=11832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/tags?post=11832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}