AI-Powered Cybercrime: How GXC Team is Redefining Phishing with Malicious Android Apps

The cybercrime landscape is constantly evolving, with threat actors continually developing more sophisticated methods to exploit victims. A recent revelation by Singaporean cybersecurity company Group-IB highlights a significant advancement in this arena, where a Spanish-speaking cybercrime group named GXC Team has been observed bundling phishing kits with malicious Android applications. This development represents a new level of sophistication in the malware-as-a-service (MaaS) offerings.

GXC Team's Sophisticated Phishing-as-a-Service Platform

Group-IB has been tracking GXC Team since January 2023, describing their crimeware solution as an "AI-powered phishing-as-a-service platform." This platform targets users from over 36 Spanish banks, governmental bodies, and 30 institutions worldwide. The phishing kits are priced between $150 and $900 per month, while the bundle, including the phishing kit and Android malware, is available on a subscription basis for about $500 per month.

Global Targets and Operations

The campaign targets users of Spanish financial institutions, tax and governmental services, e-commerce platforms, banks, and cryptocurrency exchanges in countries including the United States, the United Kingdom, Slovakia, and Brazil. Group-IB has identified 288 phishing domains linked to this activity. The services offered also include the sale of stolen banking credentials and custom coding-for-hire schemes targeting banking, financial, and cryptocurrency businesses.

Innovative Tactics: SMS OTP Stealer Malware

Unlike typical phishing developers, GXC Team has combined phishing kits with SMS OTP stealer malware, pivoting the attack scenario in a new direction. Victims are urged to download an Android-based banking app to prevent phishing attacks. These malicious apps, distributed via smishing and other methods, request permissions to be configured as the default SMS app, enabling the interception of one-time passwords and other messages, which are then exfiltrated to a Telegram bot controlled by the threat actors.

Once installed, the app opens a genuine bank's website in WebView, allowing users to interact normally. When the attacker triggers an OTP prompt, the malware silently receives and forwards SMS messages with OTP codes to the Telegram chat.

AI-Infused Voice Calling Tools

Among the other services advertised by GXC Team on a dedicated Telegram channel are AI-infused voice calling tools. These tools generate voice calls to prospective targets based on prompts directly from the phishing kit. These calls often masquerade as originating from a bank, instructing targets to provide 2FA codes, install malicious apps, or perform other actions. This mechanism makes the scam scenario even more convincing and demonstrates the rapid adoption of AI tools by criminals to transform traditional fraud scenarios into sophisticated tactics.

The Rise of AI-Powered Voice Cloning

A recent report by Google-owned Mandiant highlights the capability of AI-powered voice cloning to mimic human speech with uncanny precision. This technology allows for more authentic-sounding phishing (or vishing) schemes that facilitate initial access, privilege escalation, and lateral movement. Threat actors can impersonate executives, colleagues, or IT support personnel to trick victims into revealing confidential information, granting remote access to systems, or transferring funds. The inherent trust associated with a familiar voice can be exploited to manipulate victims into taking actions they would not normally take.

Advancements in Phishing Kits

Phishing kits, especially those with adversary-in-the-middle (AiTM) capabilities, have become increasingly popular as they lower the technical barrier to entry for pulling off phishing campaigns at scale. These kits can be used to break into accounts protected by passkeys on various online platforms by exploiting fallback mechanisms even when passkeys are configured. Cybersecurity company eSentire noted that AiTM can manipulate the view presented to users by modifying HTML, CSS, images, or JavaScript in the login page, controlling the authentication flow and removing references to passkey authentication.

Evasion Tactics

Phishing campaigns have also started embedding URLs encoded using security tools like Secure Email Gateways (SEGs) to mask phishing links and evade scanning, according to Barracuda Networks and Cofense. Social engineering attacks have been observed using unusual methods where users are enticed to visit seemingly legitimate websites and asked to manually copy, paste, and execute obfuscated code into a PowerShell terminal under the guise of fixing issues with viewing content in a web browser.

The cybercrime landscape continues to evolve with the integration of AI and other sophisticated techniques. The GXC Team's bundling of phishing kits with malicious Android applications represents a significant leap in phishing-as-a-service platforms. As threat actors adopt new technologies and tactics, it becomes increasingly important for individuals and organizations to stay vigilant and employ robust cybersecurity measures to protect against these advanced threats.

Comments

Popular posts from this blog

Faulty CrowdStrike Update Crashes Windows Systems, Impacting Businesses Worldwide

APT33 Expands Operations Targeting Aerospace, Satellite, and Energy Sectors Across the U.S., Europe, and Middle East

Stealthy BITSLOTH Backdoor Exploits Windows BITS for Covert Communication