December 3, 2018 By Shane Schick 2 min read

A pair of mobile malware threats, XLoader and FakeSpy, that posed as apps from a Japanese home delivery company may be operated by or affiliated with the same group of cybercriminals, according to recent reports.

Nearly 385,000 people around the world have been affected by XLoader and FakeSpy, which are designed to steal personal information such as financial data and install other apps, according to Trend Micro. The majority of victims are based in Japan and South Korea, and data compiled up to October shows that the number of infections from the two mobile malware threats have increased dramatically since August.

The researchers attributed both XLoader and FakeSpy to a cybercriminal collective known as the Yanbian Gang.

Signs of a Possible Mobile Malware Connection

One sign that FakeSpy and XLoader might originate from the same source is a set of about 126 domains that they share as part of their deployment procedures. A closer look at the two threats revealed marked resemblances in their code, and they also attempt to hide the origins of their command-and-control (C&C) servers in similar ways.

Both threats imitated legitimate apps of a Japanese home delivery firm to dupe users into installing the mobile malware on their devices, and the domains in question were registered with phone numbers from the same Chinese province where researchers believe the Yanbian Gang is based.

That said, the report acknowledged that the two mobile malware threats may simply have been developed and deployed in similar ways, and nothing has been definitively proven yet.

How to Stay Ahead of the Threat

No matter who is behind FakeSpy and XLoader, there’s no question they follow in the footsteps of similar mobile malware campaigns that use phishing techniques to lure their victims.

In response to such threats, IBM X-Force and IBM Research in Tokyo developed an advanced approach called ahead-of-threat detection, which brings together disparate data sources to identify potentially dangerous phishing domains before cybercriminals can use them in their social engineering schemes. With ahead-of-threat detection, chief information security officers (CISOs) and their teams can build more effective blacklists and keep the likes of XLoader and FakeSpy at bay.

Source: Trend Micro

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today