Category | Details |
---|---|
Threat Actors | Unidentified fraudsters leveraging physical mail to distribute malware. |
Campaign Overview | Fake letters claiming to offer a weather app from MeteoSwiss, containing a malicious QR code. |
Target Regions (Or Victims) | Residents in Switzerland, specifically Android phone users. |
Methodology | Delivery of physical letters with QR codes leading to malware downloads. |
Product Targeted | Android smartphones, specifically targeting over 383 mobile apps (e.g., e-banking apps). |
Malware Reference | Malware identified as “Coper” and “Octo2.” |
Tools Used | Physical letters, QR codes, counterfeit mobile applications. |
Vulnerabilities Exploited | None specified; relies on user interaction (scanning QR codes, installing fake apps). |
TTPs | Social engineering, Real-world lures, Malicious QR codes, counterfeit applications. |
Attribution | No specific actor identified; OFCS is investigating. |
Recommendations | – Avoid scanning suspicious QR codes. – Factory reset devices if infected. – Report fraudulent letters to OFCS. – Destroy the fraudulent letters. |
Source | The Record |
Read full article: Read More
Disclaimer: The above summary has been generated by an AI language model.
Leave a Reply