Yanbian Gang steals millions from mobile banking customers of South Korea

A Chinese hacking crew dubbed Yanbian Gang has siphoned data from mobile banking customers in South Korea during the past two years, according to a new report.

According to researchers at Trend Micro, the cybercriminals used fake banking apps having the same appearance (i.e. icons and user interface) of the legitimate mobile apps, to trick users. They also used other popular apps, such as utilities, chat, portal and security apps attract users into their scam and steal their mobile banking credentials.

These bogus mobile apps transferred stolen user information (i.e. mobile phone numbers, Bank account names, Bank account numbers, login credentials and Text messages) to the command and control servers.

The Yanbian Gang used several Android malware to infect mobile banking customers, none of the malware used by the gang was distributed through Google Play or third-party app stores. The Yanbian Gang has infected the victims by sending malicious text messages or downloading the malware component by other malicious code used to infect the mobile. The malware used by the Yanbian Gang was primarily remote access tools (RATs) that attackers used to gain complete control of the victims’ mobile device.

The list of malicious mobile apps used by the Yanbian Gang includes porn apps, the Google Play app and Adobe Flash Player. Researchers  from Trend Micro examined a total of 1,007 fake Google app versions, 994 of which were fake versions of the Google Play app, meanwhile the remaining 13 were fake versions of other Google apps.

“Google apps were most commonly spoofed to target South Korean bank customers. We took a look at a total of 1,007 fake Google app versions, 994 of which were fake versions of the Google Play app while the remaining 13 were fake versions of other Google apps. Cybercriminals most likely spoofed Google apps because they normally came preinstalled in every Android mobile device. The fake apps sported the Google apps’ icons, which were deleted after installation.” states the report published by TrendMicro. “The hackers used fake banking and other popular apps to victimize more than 4,000 South Korean Android mobile banking customers throughout 2013 and 2014,” according to a research report by Trend Micro. “They also used effective social engineering lures like “The Interview” to bait victims into installing their fake apps.”

The group was called Yanbian Gang because the name of the Chinese region the group is believed to operate in, the Yanbian Prefecture in Jilin.

Cybercriminal groups are usually composed of several members, each of them has a specific role in the gang. The Yanbian Gang, in particular, comprises the four major players:

  • the cowboys, which are responsible for collecting the proceeds from successful attacks and passing them onto the organizer.
  • the translators, which are responsible for localizes the threats.
  • the malware creators, which develop the malware.
  • the organizer, which synchronize the operations.

The experts believe that the group has stolen millions of dollars from mobile banking customers of at least five banks in South Korea since 2013.

“In our research, we saw fake versions of apps of five South Korean banks—KB Kookmin Bank, NH Bank, Hana Bank, Shinhan Bank, and Woori Bank. These apps steal user information and credentials,” Huang blogged. “They also have the ability to uninstall and take the place of the real apps they are spoofing. This allows them to run undetected while obtaining what they are after—victims’ personal account credentials that translate to financial gain for the fake apps’ operators.” explained the researchers at Trend Micro.

One of the attack schemes reported in the analysis published by Trend Micro used fake Internet Police apps to victimize South Korean mobile banking customers. Potential victims received SMS phishing messages that scared them with supposed investigations if they did not click a given link.

“When clicked, however, the link installed a malicious app in their devices that communicated with designated C&C servers to listen for commands,” the report notes. “We first spotted these malware in September 2013 and continued to see them till April 2014, proving the steadfast nature of the threats.” is reported about the “Internet Police scary tactic.”

Mobile platforms are a privileged target for threat actors, a recent research published by Alcatel-Lucent Motive Security Labs reported that 16 million mobile devices worldwide have been infected by malware, and the data didn’t include the China and Russia that are the countries with a significant presence of mobile devices.

Trend Micro last year published a very interesting research on the Chinese underground market revealing that it is doubled between 2012 and 2013 and its offer is very attractive for criminals that could acquire anything for mobile scams, from SMS forwarding Trojans to DDoS attack services.

Pierluigi Paganini

(Security Affairs –  Yanbian Gang, mobile)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Kaiser Permanente data breach may have impacted 13.4 million patients

Healthcare service provider Kaiser Permanente disclosed a security breach that may impact 13.4 million individuals…

11 mins ago

Over 1,400 CrushFTP internet-facing servers vulnerable to CVE-2024-4040 bug

Over 1,400 CrushFTP internet-facing servers are vulnerable to attacks exploiting recently disclosed CVE-2024-4040 vulnerability. Over…

2 hours ago

Sweden’s liquor supply severely impacted by ransomware attack on logistics company

A ransomware attack on a Swedish logistics company Skanlog severely impacted the country's liquor supply. …

5 hours ago

CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog

CISA adds Cisco ASA and FTD and CrushFTP VFS vulnerabilities to its Known Exploited Vulnerabilities…

15 hours ago

CISA adds Microsoft Windows Print Spooler flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA added the Windows Print Spooler flaw CVE-2022-38028 to its Known Exploited Vulnerabilities catalog.…

22 hours ago

DOJ arrested the founders of crypto mixer Samourai for facilitating $2 Billion in illegal transactions

The U.S. Department of Justice (DoJ) announced the arrest of two co-founders of a cryptocurrency mixer…

22 hours ago

This website uses cookies.