{"id":18002,"date":"2017-08-17T05:32:29","date_gmt":"2017-08-17T09:32:29","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=18002"},"modified":"2019-11-15T06:45:36","modified_gmt":"2019-11-15T11:45:36","slug":"faketoken-trojan-taxi","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/faketoken-trojan-taxi\/18002\/","title":{"rendered":"Taxi Trojans are on the way"},"content":{"rendered":"<p>\tYou\u2019re in a hurry, trying to get to work, a business meeting, a date. So you launch your favorite app for booking a taxi as usual, but this time, it prompts you to enter your credit card number. Does that seem suspicious? It may not \u2014 apps forget information, and all you have to do is add your card number again.\t\t<\/p>\n<p>\tHowever, after some time you notice money disappearing from your account. What happened? You may be the unlucky winner of a mobile Trojan. This kind of malware has been caught recently <a href=\"https:\/\/securelist.com\/booking-a-taxi-for-faketoken\/81457\/\" target=\"_blank\" rel=\"noopener\">stealing bank data by impersonating the interfaces of taxi-booking apps<\/a>.<\/p>\n<p>\tThe Faketoken Trojan has existed for a long time, and it has been upgraded for many years. Our experts named the current version \u201cFaketoken.q,\u201d and by now it has learned a significant number of tricks.\t\t<\/p>\n<p>\tAfter getting onto a smartphone (judging by the malware icon, Faketoken infiltrates smartphones through bulk SMS messages with a prompt to download some picture) and installing the necessary modules, the Trojan hides its shortcut icon and starts background monitoring of everything that happens in the system.\t\t<\/p>\n<div id=\"attachment_18004\" style=\"width: 778px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/08\/17052949\/faketoken-installed.jpg\"><img decoding=\"async\" width=\"768\" height=\"570\" aria-describedby=\"caption-attachment-18004\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/08\/17052949\/faketoken-installed.jpg\" alt=\"\" style=\"width:50%\" class=\"size-full wp-image-18004\"><\/a><p id=\"caption-attachment-18004\" class=\"wp-caption-text\">The icon of the installed Faketoken Trojan<\/p><\/div>\n<p>\tFirst, the Trojan is interested in the user\u2019s calls. As soon as it detects a call, it starts recording. When the call is finished, Faketoken sends the recording to the criminal\u2019s server. Second, the Trojan also checks which apps the smartphone\u2019s owner uses.\t\t<\/p>\n<p>\tWhen Faketoken detects the launch of an app whose interface it can simulate, the Trojan immediately overlays the app with its own screen. To achieve that, it uses a standard Android feature that supports <a href=\"https:\/\/www.kaspersky.com\/blog\/cloak-and-dagger-attack\/\" target=\"_blank\" rel=\"noopener nofollow\">showing screen overlays on top of all other apps<\/a>. A whole bunch of legitimate apps, such as messengers, window managers, and so on, use this feature.\t\t<\/p>\n<p>\tThe overlaying window matches the colors of the original app\u2019s interface. In this window, the Trojan prompts the user to enter the number of his or her credit card, including the verification code from the back of the card.\t\t<\/p>\n<div id=\"attachment_18005\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/08\/17052952\/faketoken-stealing-interface.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-18005\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/08\/17052952\/faketoken-stealing-interface-1024x819.jpg\" alt=\"\" width=\"1024\" height=\"819\" class=\"size-large wp-image-18005\"><\/a><p id=\"caption-attachment-18005\" class=\"wp-caption-text\">The Faketoken.q Trojan impersonates taxi-booking apps popular in Russia<\/p><\/div>\n<p>\tActually, Faketoken.q is after a huge variety of apps that have one thing in common: in them, a request to enter payment data looks normal enough not to arouse suspicion. Among the attacked apps are a number of mobile banking apps, Android Pay, the Google Play Store, apps for booking flights and hotel rooms, and apps for paying traffic tickets \u2014 as well as apps for booking taxis.\t\t<\/p>\n<p>\tDuring the very stage of stealing money from the user, Faketoken <a href=\"https:\/\/www.kaspersky.com\/blog\/banking-trojans-bypass-2fa\/11545\/\" target=\"_blank\" rel=\"noopener nofollow\">resorts to another ruse<\/a>, intercepting all incoming SMS messages, hiding them from the user, and forwarding them to the criminals\u2019 server, where one-time passwords for payment confirmation from those messages are extracted.\t\t<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"XFNOfl5fI0\"><p><a href=\"https:\/\/www.kaspersky.com\/blog\/banking-trojans-bypass-2fa\/11545\/\" target=\"_blank\" rel=\"noopener nofollow\">How banking Trojans bypass two-factor authentication<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"\u201cHow banking Trojans bypass two-factor authentication\u201d \u2014 Daily - English - Global - blog.kaspersky.com\" src=\"https:\/\/www.kaspersky.com\/blog\/banking-trojans-bypass-2fa\/11545\/embed\/#?secret=g60xL9WUkG#?secret=XFNOfl5fI0\" data-secret=\"XFNOfl5fI0\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>\tJudging by the small number of attacks that we have registered and the UI artifacts, which you can see in one of the screenshots above, we\u2019d say the researchers at our antivirus laboratory <a href=\"https:\/\/securelist.com\/booking-a-taxi-for-faketoken\/81457\/\" target=\"_blank\" rel=\"noopener\">got their hands on one of the test versions of the Trojan<\/a>, not the final one.\t\t<\/p>\n<p>\tWe must give the assiduous creators of Faketoken their due. They will most likely improve the Trojan, and a wave of infection incidents may sprout from the \u201ccommercial\u201d version at some point.\t\t<\/p>\n<p>\tCurrently the Trojan is focused on users in Russia, but as we\u2019ve seen many times in the past, cybercriminals constantly steal ideas from each other, so it won\u2019t take long for them to adopt the same trick in other countries. A lot of city dwellers have taxi-booking apps installed these days, so this trick represents a good opportunity for malware creators.\t\t<\/p>\n<p>\tBelow you can find several pieces of advice on how to protect yourself against Faketoken and similar mobile Trojans that steal card numbers and intercept SMS messages with one-time passwords used to confirm payments.\t\t<\/p>\n<ul>\n<li>It is imperative that you go into Android\u2019s settings and prohibit the installation of apps from unknown sources. To block installation from unknown sources, go to <em>Settings -&gt; Security<\/em> and uncheck <em>Unknown sources<\/em>.<\/li>\n<\/ul>\n<p>\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/08\/17053208\/unknown-sources-EN.jpg\"><img decoding=\"async\" width=\"1024\" height=\"711\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/08\/17053208\/unknown-sources-EN-1024x711.jpg\" alt=\"\" style=\"width:50%\" class=\"aligncenter size-large wp-image-18007\"><\/a>\t\t<\/p>\n<ul>\n<li>Always pay attention to what access permissions an app requests during installation, even if you downloaded it from Google Play (<a href=\"https:\/\/www.kaspersky.com\/blog\/dresscode-android-trojan\/13219\/\" target=\"_blank\" rel=\"noopener nofollow\">there might be Trojans<\/a> in the official app store as well). You can learn more about Android permissions <a href=\"https:\/\/blog.kaspersky.com\/android-permissions-guide\/14014\/\" target=\"_blank\" rel=\"noopener nofollow\">in this article<\/a>.<\/li>\n<\/ul>\n<ul>\n<li>It is a good idea to protect your smartphone by installing antivirus, which can find infections hiding in an app. For example, you can use our <a href=\"https:\/\/app.appsflyer.com\/com.kms.free?pid=smm&amp;c=ww_kdaily\" target=\"_blank\" rel=\"noopener nofollow\">basic Kaspersky Internet Security for Android, which you can download from Google Play free<\/a>.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.<\/p>\n","protected":false},"author":421,"featured_media":18003,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2683],"tags":[105,734,613,423,2611,422,723],"class_list":{"0":"post-18002","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-android","10":"tag-banking-trojans","11":"tag-faketoken","12":"tag-mobile-devices","13":"tag-taxi","14":"tag-threats","15":"tag-trojans"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/faketoken-trojan-taxi\/18002\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/faketoken-trojan-taxi\/11105\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/faketoken-trojan-taxi\/9203\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/faketoken-trojan-taxi\/4942\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/faketoken-trojan-taxi\/12435\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/faketoken-trojan-taxi\/11642\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/faketoken-trojan-taxi\/11170\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/faketoken-trojan-taxi\/14102\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/faketoken-trojan-taxi\/14119\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/faketoken-trojan-taxi\/18462\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/faketoken-trojan-taxi\/3677\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/faketoken-trojan-taxi\/9380\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/faketoken-trojan-taxi\/9584\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/faketoken-trojan-taxi\/7246\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/faketoken-trojan-taxi\/14446\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/faketoken-trojan-taxi\/8321\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/faketoken-trojan-taxi\/17610\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/faketoken-trojan-taxi\/17725\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/faketoken-trojan-taxi\/17694\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18002","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/421"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=18002"}],"version-history":[{"count":9,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18002\/revisions"}],"predecessor-version":[{"id":29931,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18002\/revisions\/29931"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/18003"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=18002"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=18002"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=18002"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}