1. Homepage
  2. Equities
  3. Japan
  4. Japan Exchange
  5. Trend Micro
  6. News
  7. Summary
    4704   JP3637300009

TREND MICRO

(4704)
  Report
Delayed Japan Exchange  -  12:58 2022-06-30 am EDT
6660.00 JPY   -3.34%
06/24AssistMotion Inc. announced that it has received ¥125 million in funding from Trend Micro Incorporated
CI
06/15Ankura CTIX FLASH Update - May 31, 2022
AQ
06/02TREND MICRO : Partners With Interpol and Nigeria's EFCC for Operation Killer Bee, Takes Down Nigerian BEC Actors
PU
SummaryQuotesChartsNewsRatingsCalendarCompanyFinancialsConsensusRevisions 
SummaryMost relevantAll NewsOther languagesPress ReleasesOfficial PublicationsSector news

Trend Micro : SMS PVA Services' Use of Infected Android Phones Reveals Flaws in SMS Verification

02/15/2022 | 09:47am EDT

Using these code snippets and C&C traffic as fingerprints, we were able to identify two more DEX files with the same functionality but different C&Cs, indicating an active development process and several versions of both the development code and production code of the Android malware.

Only text messages sent by specific services and matched by the regex provided by the C&C were intercepted. This is likely to prevent the user of the Android phone from discovering the malicious activity. The malware remains low-profile, collecting only the text messages that match the requested application so that it can covertly continue this activity for long periods. If the SMS PVA service allows its customers to access all messages on the infected phones, the owners would quickly notice the problem.

The SMS PVA service also controls the type of platforms that customers can receive text messages on (as listed in Figure 1). This means that the operators behind the service can make sure no obvious malicious activity occurs on the infected phones. If the service, for example, allowed the theft of two-factor authentication (2FA) for banking apps, then the real users would be alerted and take action, which would then result in the SMS PVA service losing its asset.

Use of residential proxies

Online platforms and services often authenticate new accounts by validating the location of the user during registration. For example, an IP address might be required to match the geographical location of the phone number used for the account.

To circumvent this, SMS PVA users use third-party IP masking services, such as proxies or virtual private networks (VPNs), to change the IP address that will be recorded when they try to connect to a desired service. Using Trend Micro™ Smart Protection Network™ (SPN) telemetry, we have identified that the users of SMS PVA services extensively use a variety of proxy services and distributed VPN platforms to bypass the IP geolocation verification checks.

User registration requests and SMS PVA API requests often come from an exit node of a VPN service or a residential proxy system. This means that the users of SMS PVA services typically use them in combination with some sort of residential proxy or a VPN service that allows them to select the country of the IP exit node to match the telephone number used to register the service.

Security implications of SMS PVA services and their effects on SMS verification

SMS verification has become the default authentication method for many online platforms and applications. Many IT departments treat SMS verification as a "secure" black box validation tool for user accounts. Currently, however, online services and platforms should be wary about heavily relying on SMS verification. These SMS PVA services prove that cybercriminals are indeed able to defeat SMS verification at scale. This also means that there could be authenticated and verified accounts on platforms that behave like bots, trolls, or fraudulent accounts.

"Authentic user behavior" on certain platforms can be manipulated by malicious actors with SMS PVA accounts. This means that a platform could incur increased costs due to scam and fraud. A platform might even be involved (directly or indirectly) with personal injury or damage to property.

Based on previous uses of fake accounts, we can predict how threat actors will use these services in their scams and criminal activities.

Anonymity tool

Cybercriminals use disposable numbers for many different activities because they can register accounts without worrying about being traced. Also, because the infected mobile phone numbers they use are attached to real people, law enforcement inquests about their accounts will be traced to another person.

We saw one example of misuse linked to a buy-now-pay-later scheme. In this example, several malware samples used SMS PVA services to acquire phone numbers and linked those numbers to existing online payment service accounts. Afterward, the malicious actors attempted purchase transactions from an online shopping site. Although we only identified a few samples of such activities, we believe that when automated, these accounts can be used at large to perform illicit purchases or money laundering. 

These services can also be used to avoid responsibility for damages or illegal activity on commerce platforms. In 2020, a Russian car-sharing service accused a man of being involved in a car accident. However, it was revealed that the account used for the car-sharing service was a fraudulent account set up using the accused man's name and disposable SIM cards for verification.

Coordinated inauthentic behavior

Coordinated inauthentic behavior is often used to distribute and amplify information (often misinformation) in social networks. This can be done at scale, fast, and with the necessary speed and precision using SMS PVA services. Large campaigns can be used to manipulate public opinion on brands, services, political views, or government programs such as vaccination campaigns. Organizers of fake news can even use SMS PVA services to create online troll armies.

Some SMS PVA services have thousands of compromised smartphones spread across various countries. The service can allow customers to register social media accounts in bulk and in specific countries that the actors behind these services are targeting.

Abuse of sign-on bonuses

Sign-on bonuses (often given whenever a new account is registered) can also be abused using the SMS PVA service. For example, Bolt, a ride-hailing service popular in Eastern Europe, Africa, and Western Asia, incentivized new sign-ons by giving away free ride credits for every new account. Some SMS PVA services realized this as a potential monetization scheme and even advertised having "unlimited discounted Bolt rides " to persuade people to use the SMS PVA service.

Conclusions and recommendations

The core security issue is that an enterprise has the ability to monitor and intercept text messaging from tens of thousands of devices all around the world, and then profit from this interception by offering the service to whoever can pay for it. Another chilling thought is that the customizable regular expression patterns supplied by the C&C mean that the SMS interception capability is not limited to verification codes. It can also be extended to the collection of one-time password (OTP) tokens or even used as a monitoring tool by oppressive regimes.

The SMS PVA service operation not only shows the inadequacy and insufficiency of one-time SMS verification as the primary means of validation, but also highlights the need for better mobile security and privacy. The malware that infects these phones might be unwittingly downloaded by users, or could imply a gap in supply-chain security.

Trend Micro is able to detect the malicious code and block traffic to C&C servers. But a comprehensive solution requires challenging built-in fundamental assumptions with respect to account verification, more effective content moderation, and enhancing smartphone security.

To read more about this threat, download our research paper, "SMS PVA: An Underground Service Enabling Threat Actors to Register Bulk Fake Accounts."

Indicators of Compromise (IOCs)

Dex SHA1s:

  • 24b24990937b4265e276db8271b309c05e1d374b
  • 6a65e2a484f49e82a0cea5a1c2d5706314f0064a
  • e83ec56dfb094fb87b57b67449d23a18208d3091

Domains:

  • Smspva[.]net
  • Enjoynut[.]cn
  • Sublemontree[.]com
  • Lemon91[.]com
  • Lemon91[.]top

Detections:

Disclaimer

Trend Micro Inc. published this content on 15 February 2022 and is solely responsible for the information contained therein. Distributed by Public, unedited and unaltered, on 15 February 2022 14:46:00 UTC.


© Publicnow 2022
All news about TREND MICRO
06/24AssistMotion Inc. announced that it has received ¥125 million in funding from Trend Mic..
CI
06/15Ankura CTIX FLASH Update - May 31, 2022
AQ
06/02TREND MICRO : Partners With Interpol and Nigeria's EFCC for Operation Killer Bee, Takes Do..
PU
06/01Japan's Nikkei retreats from 6-week high as Astellas, Sony drag
RE
05/25Trend Micro Incorporated Creates Dedicated US Federal Business Unit
CI
05/16Cyber professionals gathered at Helsinki Expo and Convention Centre after a three years..
AQ
04/25TREND MICRO : New Partner Bit Discovery Helps TM with Attack Surface
PU
04/25Trend Micro Announces the Launch of Trend Micro One, a Unified Cybersecurity Platform
CI
04/24TREND MICRO : How to better manage your digital attack surface risk
PU
04/20TREND MICRO : Spring4Shell Vulnerability CVE-2022-22965 Exploited to Deploy Cryptocurrency..
PU
More news
Financials
Sales 2022 210 B 1 540 M 1 540 M
Net income 2022 31 887 M 233 M 233 M
Net cash 2022 245 B 1 793 M 1 793 M
P/E ratio 2022 30,1x
Yield 2022 2,49%
Capitalization 963 B 7 045 M 7 045 M
EV / Sales 2022 3,41x
EV / Sales 2023 3,10x
Nbr of Employees 7 024
Free-Float 94,6%
Chart TREND MICRO
Duration : Period :
Trend Micro Technical Analysis Chart | MarketScreener
Full-screen chart
Technical analysis trends TREND MICRO
Short TermMid-TermLong Term
TrendsBearishNeutralBullish
Income Statement Evolution
Consensus
Sell
Buy
Mean consensus HOLD
Number of Analysts 13
Last Close Price 6 890,00 JPY
Average target price 7 017,69 JPY
Spread / Average Target 1,85%
EPS Revisions
Managers and Directors
Yi Fen Chen Auditor
Mahendra Negi Group CFO, COO & Representative Director
Ming Jang Chang Representative Director
Oscar Chang Executive Vice President-Research & Development
Max Cheng Chief Information Officer & Executive VP
Sector and Competitors
1st jan.Capi. (M$)
TREND MICRO5.63%7 045
MICROSOFT CORPORATION-22.62%1 918 222
DASSAULT SYSTÈMES SE-31.02%50 000
ATLASSIAN CORPORATION PLC-49.55%48 963
SYNOPSYS INC.-17.59%46 452
CADENCE DESIGN SYSTEMS, INC.-19.44%41 397