How to protect yourself from phishing

This is the first case in Japan where a type of malware that targets iPhones resulted in financial damage.

This campaign shows that iPhones can indeed be infected by malware once a malicious configuration profile is installed. This case also confirmed that simply accessing a malicious website would not inevitably infect a device with malware. Rather, a user has to complete the process of installing the malware for infection to take place. This means that with enough knowledge and caution, a user can protect their device from infection.

We also believe that smishing continues to be part of this loop of attack chains targeting smartphones. In the meantime, JC3 continues to publish alert notifications with regard to the same campaign detailed in this blog for additional reference.

More details on smishing and how to protect yourself from such threats can be found in this blog.

Indicators of compromise

SHA256 Trend Micro Detection
b42bdfceb8e7733db22645fee95482dccf5260dcd3ff15ede0de77d2120c3845 AndroidOS_TianySpy.GCL
a16878598e0ce5924fa45c09319b48e566f4d935626042ba378f4f1f7b9ad798
5d27cc2e0a8ab987341e8995bf50cc763160cce4191df9a94c4b39b570c0d6a5
73c19a778500c6fb04f60d60527ea76a870590ed9e0f6014cb03419d02ff0457
ada8dfe4914f824e5a4a03aec8f135a4544cc0086830f23285dc67d42ec1f29c
839246c1b13d2d9c87907bdd4069ce0aad02e5660cb10fad4a85805e4b81dcea

Attachments

  • Original Link
  • Original Document
  • Permalink

Disclaimer

Trend Micro Inc. published this content on 25 January 2022 and is solely responsible for the information contained therein. Distributed by Public, unedited and unaltered, on 25 January 2022 14:46:05 UTC.