{"id":18380,"date":"2020-01-13T06:13:00","date_gmt":"2020-01-13T11:13:00","guid":{"rendered":"https:\/\/www.kaspersky.co.in\/blog\/faketoken-trojan-sends-offensive-sms\/18380\/"},"modified":"2021-10-04T22:17:10","modified_gmt":"2021-10-04T16:47:10","slug":"faketoken-trojan-sends-offensive-sms","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/faketoken-trojan-sends-offensive-sms\/18380\/","title":{"rendered":"The Faketoken Trojan sends out offensive texts"},"content":{"rendered":"<p>The inventiveness of virus makers knows no bounds. Some ransomware apps now have <a href=\"https:\/\/www.kaspersky.com\/blog\/rakhni-miner-cryptor\/22988\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">mining capabilities<\/a>, and <a href=\"https:\/\/securelist.com\/latest-version-of-svpeng-targets-users-in-us\/63746\/\" target=\"_blank\" rel=\"noopener noreferrer\">some banking trojans extort their victims<\/a>. Faketoken may have a goofy name, but this banking Trojan for Android devices is serious business.<\/p>\n<h2>Faketoken: From SMS thief to full-fledged banker<\/h2>\n<p>The banking Trojan Faketoken has been around for quite a while \u2014 back in 2014, it <a href=\"https:\/\/securelist.com\/kaspersky-security-bulletin-2014-overall-statistics-for-2014\/68010\/68010\/\" target=\"_blank\" rel=\"noopener noreferrer\">made our top 20 list of the most widespread mobile threats<\/a>. Back then, the malware operated in concert with desktop <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/banker-trojan-banker\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">banking Trojans<\/a>. The desktop app hacked victims\u2019 accounts and withdrew money, and Faketoken intercepted text messages with one-time passwords to confirm the transactions.<\/p>\n<p>By 2016, Faketoken had become a full-fledged mobile banking Trojan, <a href=\"https:\/\/securelist.com\/the-banker-that-encrypted-files\/76913\/\" target=\"_blank\" rel=\"noopener noreferrer\">stealing money directly<\/a>. It overlaid other apps with fake windows to trick users into entering their logins, passwords, and bank card info. It also functioned effectively as ransomware, blocking the infected devices\u2019 screens and encrypting their files.<\/p>\n<p>By 2017, Faketoken could mimic a lot of apps \u2014 mobile banking apps, e-wallets such as Google Pay, and even <a href=\"https:\/\/www.kaspersky.com\/blog\/faketoken-trojan-taxi\/18002\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">taxi service apps<\/a> and apps for payment of fines and penalties \u2014 to steal bank account data.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic\">\n<h2>An unexpected turn for Faketoken<\/h2>\n<p>Not long ago, our botnet activity monitoring system \u2014 Botnet Attack Tracking \u2014 detected that some 5,000 smartphones infected by Faketoken had started sending offensive text messages. That seemed weird.<\/p>\n<p>SMS capability is in fact standard equipment for mobile malware apps, many of which spread through download links they send to victims\u2019 contacts. In addition, banking Trojans often ask to become the default SMS application so they can intercept confirmation code messages. But for banking malware to turn into a mass texting tool? We had never seen that before.<\/p>\n<h2>SMS abroad \u2014 at your expense<\/h2>\n<p>Faketoken\u2019s messaging activities are charged to the infected device owners. Before sending anything out, it confirms that the victims bank account has sufficient funds. If the account has the cash, then the malware uses the card to top up the mobile account before proceeding with messaging.<\/p>\n<p>Many of the smartphones infected by Faketoken were texting a foreign number, so the messages the Trojan sent cost the users quite a bit.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic-2\">\n<h2>Protecting yourself from Faketoken<\/h2>\n<p>We don\u2019t yet know whether this Faketoken offensive is a one-off campaign or the beginning of a trend. For now, however, to avoid getting ensnared:<\/p>\n<ul>\n<li>Install only applications distributed by Google Play, and use your phone\u2019s settings to <a href=\"https:\/\/www.kaspersky.com\/blog\/unknown-apps-android\/41656\/\" target=\"_blank\" rel=\"noopener nofollow\">disable the downloading of apps from other sources<\/a>.<\/li>\n<li>Do not follow links from messages unless you are sure they are safe \u2014 even messages from people you know. For example, if someone who normally posts photos on social media or sends them through instant messaging apps instead sends you a text message with a link, that\u2019s a red flag.<\/li>\n<li>Install a reliable security solution. <a href=\"https:\/\/www.kaspersky.co.in\/mobile-security?icid=in_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____ccbe3384bb4e1385\" target=\"_blank\" rel=\"noopener\">Kaspersky for Android<\/a><strong>\u00a0<\/strong>detects and blocks Faketoken as well as many other mobile malware apps.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The ransomware app now uses infected devices to send SMS messages abroad on the victim\u2019s dime.<\/p>\n","protected":false},"author":2555,"featured_media":18381,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2196],"tags":[105,708,205,589,430,46,527],"class_list":{"0":"post-18380","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-android","9":"tag-banking-trojans","10":"tag-botnets","11":"tag-faketoken","12":"tag-mobile-devices","13":"tag-sms","14":"tag-threats"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/faketoken-trojan-sends-offensive-sms\/18380\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/faketoken-trojan-sends-offensive-sms\/15254\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/faketoken-trojan-sends-offensive-sms\/7390\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/faketoken-trojan-sends-offensive-sms\/20140\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/faketoken-trojan-sends-offensive-sms\/18441\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/faketoken-trojan-sends-offensive-sms\/16904\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/faketoken-trojan-sends-offensive-sms\/20868\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/faketoken-trojan-sends-offensive-sms\/19660\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/faketoken-trojan-sends-offensive-sms\/26021\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/faketoken-trojan-sends-offensive-sms\/7539\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/faketoken-trojan-sends-offensive-sms\/32048\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/faketoken-trojan-sends-offensive-sms\/13597\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/faketoken-trojan-sends-offensive-sms\/13893\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/faketoken-trojan-sends-offensive-sms\/12635\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/faketoken-trojan-sends-offensive-sms\/21878\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/faketoken-trojan-sends-offensive-sms\/10623\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/faketoken-trojan-sends-offensive-sms\/26619\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/faketoken-trojan-sends-offensive-sms\/24818\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/faketoken-trojan-sends-offensive-sms\/20823\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/faketoken-trojan-sends-offensive-sms\/25665\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/faketoken-trojan-sends-offensive-sms\/25496\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/18380","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/2555"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=18380"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/18380\/revisions"}],"predecessor-version":[{"id":23458,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/18380\/revisions\/23458"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/18381"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=18380"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=18380"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=18380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}