FakeCop Android Malware Goes After Users in Japan
The FakeCop Android Malware is a dangerous threat, which is currently targeting Android users in Japan. The implant is spread with the help of fake security applications that, in reality, try to hijack personal and sensitive information from the victim's devices. This information stealer is a high-profile threat that could help its operators spy on users, steal money, and perform other nefarious tasks.
The payloads of the FakeCop Android Malware were hidden in bogus APK files, which are being promoted as helpful security apps. The malicious software was hosted on fake domains, which users are likely to be redirected to because of fake ads and pop-ups, social media spam, and other dubious content. Once running, this dangerous malware will immediately gather the victim's text messages, list of applications, contacts, and other data. All of the information is compressed and sent to the control server of the attackers.
Fake Security Apps Spread the FakeCop Android Malware
One of FakeCop Android Malware's interesting features is the ability to send text messages, which the criminals could abuse for monetary gain, usually by sending hidden premium text messages. Users are likely to only find out about this when they get their monthly phone bill. However, the same method could also come in use to infect more users. By sending messages from a trustworthy sender, the victim's other contacts could easily fall for the fake APK file.
It is unlikely that an Advanced Persistent Threat (APT) actor is behind the campaign. It is not yet clear why Japanese users are the primary target of the ongoing FakeCop Android Malware campaign. You can ensure your device's protection against this threat and other Android implants by using a reputable, up-to-date anti-malware app.