• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Mobile   »   Smartphones: The Next One-Click Billing Fraud Target

Smartphones: The Next One-Click Billing Fraud Target

  • Posted on:August 30, 2011 at 2:34 am
  • Posted in:Mobile
  • Author:
    Noriaki Hayashi (Senior Threat Researcher)
1

One-click billing fraud, a scheme known for targeting PC users in Japan, now appears to target smartphone users as well.

The scheme, as its name suggests, tricks a victim into registering and paying for a certain service after being falsely led to a specific website. Instances of successful attacks have been increasing in Japan since 2004, which already amounts to 903 inquiries to the Information Technology Promotion Agency Japan in November 2009.

A typical attack involves a spam sent to the victim, which includes a link to a website that hosts free videos. The website lists videos with sensational titles to catch users’ attention. Trying to view any of the video displays a trailer, which explains why viewing it is free.

Click for larger view

Once the trailer ends, a link that says “view more” is displayed, which the users must click to supposedly see the video they originally wanted to view. Instead, users are redirected to a page that they should register first to in order to become a member and are told to pay a fee. The window that informs users to pay will continuously be displayed on the screen unless they pay the said amount.

Click for larger view


During our monitoring of sites related to this threat, I found one interesting URL that contains a Quick Response (QR) code and text that says, “Please kindly visit this site by mobile phone.”

Click for larger view

When I scanned the code, I found that it leads to the same URL as the one that displayed in the QR code, except that it displays an adult site when accessed via a mobile device.

Click for larger view

Checking the site’s Terms of Service, I found that the site charges a service fee of 49,800 Yen and is set to immediately charge a user once he/she has registered.

Clicking any of the videos in the site leads to an age verification page. Once users confirm their age and clicks “Register,” it triggers another display that says that data from the mobile device is now being transferred and registered.

Click for larger view

Now, one can imagine how alarming the message can be to an average user, given that the website involved is an adult site. However, the fortunate truth is that the site is not capable of retrieving information from the device and of sending this to a remote website. The site simply displays information about the device such as the IP address as well as a customer ID and a device ID supposedly assigned to the user in an attempt to scare him/her into paying.

However, what makes this fraud noteworthy is that users may be convinced that their information was really sent to the adult site. In turn, they may be willing to pay the specified amount, fearing that not doing so may cause them trouble and embarrassment.

So why are cybercriminals who conduct this kind of scheme targeting smartphone users? My assumption is that they are leveraging the fact that mobile device users are still not fully aware that they are becoming a primary target of cybercrime. Also, smartphones have small screens, causing the URLs to not be fully displayed, which makes it difficult for users to verify if the URL is malicious or not. Smartphone users also tend to easily save their personal information such as private pictures, addresses, and schedules in these devices, making them prime targets of information theft.

With this, users are strongly advised to consider investing in an effective mobile security app. iPhone and Android mobile device users can respectively try out the Trend Micro Smart Surfing for iPhone and Trend Micro Mobile Security – Personal Edition apps.

Learn how to protect Enterprises, Small Businesses, and Home Users from ransomware:
ENTERPRISE »
SMALL BUSINESS»
HOME»

Featured Stories

  • systemd Vulnerability Leads to Denial of Service on Linux
  • qkG Filecoder: Self-Replicating, Document-Encrypting Ransomware
  • Mitigating CVE-2017-5689, an Intel Management Engine Vulnerability
  • A Closer Look at North Korea’s Internet
  • From Cybercrime to Cyberpropaganda

Security Predictions for 2019

  • Our security predictions for 2019 are based on our experts’ analysis of the progress of current and emerging technologies, user behavior, and market trends, and their impact on the threat landscape. We have categorized them according to the main areas that are likely to be affected, given the sprawling nature of the technological and sociopolitical changes under consideration.
    Read our security predictions for 2019.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Recent Posts

  • Current and Future Hacks and Attacks that Threaten Esports
  • AutoIT-compiled Negasteal/Agent Tesla, Ave Maria Delivered via Malspam
  • Fake Photo Beautification Apps on Google Play can Read SMS Verification Code to Trigger Wireless Application Protocol (WAP)/Carrier Billing
  • CVE-2019-16928: Exploiting an Exim Vulnerability via EHLO Strings
  • FIN6 Compromised E-commerce Platform via Magecart to Inject Credit Card Skimmers Into Thousands of Online Shops

Popular Posts

  • Gambling Apps Sneak into Top 100: How Hundreds of Fake Apps Spread on iOS App Store and Google Play
  • Adware Posing as 85 Photography and Gaming Apps on Google Play Installed Over 8 Million Times
  • Anubis Android Malware Returns with Over 17,000 Samples
  • Powload Loads Up on Evasion Techniques
  • Mac Malware that Spoofs Trading App Steals User Information, Uploads it to Website

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.