• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Wapdropper Malware Hooks You Up To Premium Telecoms Services

WAPDropper malware hooks you up to premium telecoms services

You are here: Home / General Cyber Security News / WAPDropper malware hooks you up to premium telecoms services

Shutterstock

A recently identified malware pressure has been determined in the wild that unwittingly registers victims for high quality expert services delivered by reputable telecoms companies. 

Named WAPDropper, the malware downloads and executes a payload, dropping a wi-fi application protocol (WAP) top quality dialer which subscribes its victims to top quality solutions in Thailand and Malaysia without having their information or consent.

✔ Approved Seller by TheCyberSecurity.News From Our Partners
Bitdefender Internet Security 2021

Protect yourself against all threads using Bitderender. Get Bitdefender Internet Security with 68% discount from a bitdefender official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The malware pressure comprises two independent modules, in accordance to Check out Level Research, including a dropper module accountable for downloading the second-stage malware, and a top quality dialer module that is accountable for the subscription element. 

This marketing campaign recognized by the researchers subscribes customers to premium products and services presented by respectable telecoms vendors in Thailand and Malaysia.  

The scheme is centred on making phone calls to premium-fee quantities, which will, in switch, make earnings for the cyber criminals who collaborate with the homeowners of these certain phone figures.

Soon after the application is first put in on a system utilizing third-party app suppliers, WAPDropper contacts the command and regulate server and receives the payloads to execute. This very first payload is the premium dialer module, which opens a very small web window and contacts premium expert services. 

After WAPDropper opens the landing webpages, it’ll endeavor to subscribe the target to these providers. Alarmingly, the procedure involves a mechanism that can bypass the CAPTCHA security prerequisite, which have to be conquer to full a transaction. 

It is at this phase that the operators deploy the providers of Super Eagle, a Chinese company that provides a equipment discovering device for impression recognition. When the malware submits the verification code picture to the support, the system returns the coordinate placement of the recognition consequence in the picture, then parses the coordinate simulation landing.

The malware also attempts to prevent detection by hiding its icon to stop end users from spotting it on their system and uninstalling the app. The malware also performs checks to figure out whether or not the target is making use of a proxy or virtual non-public network (VPN). 


Some sections of this report are sourced from:
www.itpro.co.uk

Previous Post: «Cyber Security News Smart Doorbells Are Wide Open to Security Flaws
Next Post: #BlackFriday: 84% of Consumers Willing to Risk Personal Data in Search of Bargains Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Big Tech Bans Social Networking App
  • Lack of Funding Could Lead to “Lost Generation” of Cyber-Startups
  • Unveiled: SUNSPOT Malware Was Used to Inject SolarWinds Backdoor
  • ‘I’ll Teams you’: Employees assume security of links, file sharing via Microsoft comms platform
  • DarkSide decryptor unlocks systems without ransom payment – for now
  • Researchers see links between SolarWinds Sunburst malware and Russian Turla APT group
  • Millions of Social Profiles Leaked by Chinese Data-Scrapers
  • Feds will weigh whether cyber best practices were followed when assessing HIPAA fines
  • SolarWinds Hack Potentially Linked to Turla APT
  • 10 quick tips to identifying phishing emails

Copyright © TheCyberSecurity.News, All Rights Reserved.