+44 (0)203 88 020 88

Menu

Search

Cyber Security News & Articles

 

Cyber Security
News & Articles

Trusted Cyber Security Experts
25+ Years Industry Experience
Ethical, Professional & Pragmatic

Microsoft Issue Warning Over Android Toll Fraud

Toll fraud malware is similar to billing fraud; it triggers the subscription of users to premium services without their knowledge or consent. Microsoft have called toll fraud “one of the most prevalent types of Android malware”, emphasising why it is important to keep informed about this actively evolving threat. Users of Android 9.0 or lower have specifically been targeted by this form of attack, when users are tricked into installing malicious apps. 

Despite the fact this type of malware first became well known in 2017, Microsoft have identified a lack of understanding amongst the public over how toll fraud malware works, and its prevalence. Microsoft’s security blog issued an in-depth look at the toll fraud malware that currently affects Android users to help people understand this threat and how to mitigate it.  

The most common toll fraud attack uses Wireless Application Protocol (WAP), a billing payment mechanism that allows subscription service charges to be billed directly to the user’s mobile phone bill. In a true case of a user subscribing to a premium service, the phone and premium service provider communicate in multiple steps, which begin with the user clicking the subscribe link (usually HTML-based) and can sometimes include a one-time passcode (OTP) being sent to the user’s phone, which needs to be sent back to the service provider in order to confirm the subscription.  

In toll fraud, the malware disables the user’s Wi-Fi by abusing the setWifiEnabled method of the WifiManager class. This is possible if the permissions of ACCESS_WIFI_STATE and CHANGE_WIFI_STATE are set to normal protections. Network status is monitored by the NetworkCallback, and also retrieves a networktype variable that can bind the process to a chosen network through the ConnectivityManager.bindProcessToNetwork function, which causes the malware to use the mobile network even when a Wi-Fi connection is available. 

Once the malware has ensured the phone is communicating via the mobile network only, it then communicates with a C2 server to receive a list of subscription services. The malware silently navigates to the subscription page and auto-clicks the subscription button though a JavaScript injection. An HTML cookie is dropped to ensure each service is only subscribed to once so as not to cause an error. If an OTP is sent to validate the subscription, this is intercepted by the malware, and sent to the service provider to continue the subscription. The malware has been designed so that is can intercept both HTTP and USSD protocol so that it captures all possible OTPs. It also then disables SMS notifications, so that the user is not made aware of this subscription in the future.  

To mitigate the threat of toll fraud malware, users should be wary of permissions requested by apps upon download. Any app that asks for permissions to read or send SMS messages or asks for accessibility permissions should raise immediate red flags. Apps should only be downloaded from trusted sources such as the Google Play Store in order to avoid apps with malicious intent. Installing endpoint protection on Android devices can also help detect malware and prevent the abuse of permissions that makes toll fraud possible. 

 

 

Subscribe to our monthly newsletter today

If you’d like to stay up-to-date with the latest cyber security news and articles from our technical team, you can sign up to our monthly newsletter. 

We hate spam as much as you do, so we promise not to bombard you with emails. We’ll send you a single, curated email each month that contains all of our cyber security news and articles for that month.

Why Choose SecureTeam?

CREST
CCS
ISO9001
ISO27001
CE-PLUS

Customer Testimonials

“We were very impressed with the service, I will say, the vulnerability found was one our previous organisation had not picked up, which does make you wonder if anything else was missed.”

Aim Ltd Chief Technology Officer (CTO)

"Within a very tight timescale, SecureTeam managed to deliver a highly professional service efficiently. The team helped the process with regular updates and escalation where necessary. Would highly recommend"

IoT Solutions Group Limited Chief Technology Officer (CTO) & Founder

“First class service as ever. We learn something new each year! Thank you to all your team.”

Royal Haskoning DHV Service Delivery Manager

“We’ve worked with SecureTeam for a few years to conduct our testing. The team make it easy to deal with them; they are attentive and explain detailed reports in a jargon-free way that allows the less technical people to understand. I wouldn’t work with anyone else for our cyber security.”

Capital Asset Management Head of Operations

“SecureTeam provided Derbyshire's Education Data Hub with an approachable and professional service to ensure our schools were able to successfully certify for Cyber Essentials. The team provided a smooth end-to-end service and were always on hand to offer advice when necessary.”

Derbyshire County Council Team Manager Education Data Hub

“A very efficient, professional, and friendly delivery of our testing and the results. You delivered exactly what we asked for in the timeframe we needed it, while maintaining quality and integrity. A great job, done well.”

AMX Solutions IT Project Officer

“We were very pleased with the work and report provided. It was easy to translate the provided details into some actionable tasks on our end so that was great. We always appreciate the ongoing support.”

Innovez Ltd Support Officer

Get in touch today

If you’d like to see how SecureTeam can take your cybersecurity posture to the next level, we’d love to hear from you, learn about your requirements and then send you a free quotation for our services.

Our customers love our fast-turnaround, “no-nonsense” quotations – not to mention that we hate high-pressure sales tactics as much as you do.

We know that every organisation is unique, so our detailed scoping process ensures that we provide you with an accurate quotation for our services, which we trust you’ll find highly competitive.

Get in touch with us today and a member of our team will be in touch to provide you with a quotation. 

0

No products in the basket.

No products in the basket.