SunsetHost

Have questions? Call now! +1-855-211-0932(ID:316610)
HomeHacker News & UpdatesNew Android SpyAgent Malware Uses OCR to Steal Crypto Wallet Recovery Keys

New Android SpyAgent Malware Uses OCR to Steal Crypto Wallet Recovery Keys

South Korean Android Users Targeted by Sophisticated SpyAgent Malware Campaign

Android device users in South Korea have recently become the target of a new and sophisticated malware campaign featuring a new type of threat known as SpyAgent. This malicious software, which has also expanded its reach to the United Kingdom, represents a significant escalation in mobile malware threats, particularly in the realm of cryptocurrency security.

How SpyAgent Malware Operates

The SpyAgent malware campaign employs a cunning strategy to compromise devices. It begins with SMS messages containing deceptive links that prompt users to download fake Android apps. These apps, masquerading as legitimate banking, government, streaming, and utility applications, are actually designed to steal sensitive information from the user’s device.

Once installed, these bogus apps request intrusive permissions, allowing them to collect a broad range of data from the infected device. This includes contacts, SMS messages, photos, and other critical information, which is then exfiltrated to an external server controlled by the threat actors.

Key Feature: Optical Character Recognition (OCR)

The most alarming feature of SpyAgent is its use of Optical Character Recognition (OCR) technology to target cryptocurrency wallets. Specifically, SpyAgent scans for images on the device that might contain mnemonic keys, also known as recovery or seed phrases. These phrases are crucial for accessing and recovering cryptocurrency wallets.

By leveraging OCR, SpyAgent can extract these mnemonic keys from images and use them to gain unauthorized access to cryptocurrency wallets, potentially allowing attackers to siphon all the funds stored in these wallets.

Technical Details and Security Concerns

McAfee Labs researcher SangRyol Ryu noted that the SpyAgent malware has made a significant tactical shift. Initially, the malware communicated with its command-and-control (C2) server via simple HTTP requests, which were relatively easy to detect and block. However, SpyAgent has now adopted WebSocket connections for communication. This upgrade facilitates more efficient, real-time interactions with the C2 server and helps the malware evade detection by traditional HTTP-based network monitoring tools.

Furthermore, the C2 infrastructure used by SpyAgent has exhibited serious security lapses. Notably, it allowed unauthorized access to the site’s root directory and exposed collected victim data. The server also features an administrator panel that can remotely control infected devices. Evidence of an Apple iPhone device running iOS 15.8.2 with Simplified Chinese as the system language suggests that the malware may also target iOS users.

Comparative Threat: CraxsRAT

This development follows the recent exposure of another Android malware, CraxsRAT, which has been targeting banking users in Malaysia since February 2024. CraxsRAT, a notorious remote access trojan (RAT), provides extensive control over infected devices, including keylogging, recording screens, cameras, and calls. This malware has previously targeted users in Singapore, illustrating the broader scope of mobile malware threats.

Protective Measures

To protect against SpyAgent and similar threats, users should exercise caution when downloading apps and be wary of unsolicited SMS messages with links. Installing apps only from trusted sources, regularly updating software, and using robust security tools can help mitigate the risks posed by such sophisticated malware campaigns.

As mobile malware continues to evolve, staying informed about the latest threats and adopting proactive security measures remain crucial for safeguarding personal and financial information.