by Anand Singh

SonicWall Capture Labs threat researchers identified an ongoing Android scam campaign targeting users with fake promotional offers, cashback rewards, and traffic-fine notifications. Distributed via social media, messaging platforms, and third-party app stores, the campaign deceives victims into installing a malicious application disguised as a legitimate service. Once installed, the app requests intrusive permissions, displays phishing interfaces to steal card details, OTPs, and UPI PINs, intercepts calls and SMS messages, and exfiltrates sensitive device and user data to attacker-controlled command-and-control (C2) servers.

Infection Cycle
The application, presented as “Gift Card Hub,” invites users to spin a wheel for a chance to win a reward, claiming they can obtain a $100 gift card of their choice for just $1, as shown below:

The app offers items for $1, asks for payment, collects card details, and sends them to the attacker’s server.

This campaign also targets users in India with messages about vouchers, cashback, and traffic fines.

The images show how attackers use cashback offers and traffic-fine messages to lure users into installing the malicious apps.



The malware gathers device details and sends them to its server.
The malware uses a WebView to open and display a local web page (index.html) stored inside the app asset folder.
The index.html file includes malicious scripts that collect the user’s phone number and send it to the attacker’s Telegram bot.

The app asks the user to make a UPI payment and secretly captures the entered UPI PIN and payment details, sending them to an attacker-controlled Firebase database

Using a Telegram bot token and chat ID, can access victims’ personal information and stolen card details.
SonicWall Protections
SonicWall Capture Labs provides protection against this threat via the SonicWall Capture ATP w/RTDMI.
Indicators of Compromise (IOCs)
APK file’s Sha-256
Network:
Share This Article

An Article By
An Article By
Anand Singh
Anand Singh