GoldFactory Targets SE Asian Users with Malware-Linked Fake Bank Apps

GoldFactory cybercrime group targets Southeast Asian mobile users with advanced Android malware in fake government apps to steal data and bypass security.

  • The cybercrime group GoldFactory targets mobile users in Indonesia, Thailand, and Vietnam through fake government service apps.
  • Modified banking apps embed Android Malware using frameworks like Frida, Dobby, and Pine to manipulate legitimate apps and bypass security.
  • Over 11,000 infections have been linked to more than 300 malware samples, mostly affecting the Indonesian market.
  • A new malware variant called Gigaflower offers advanced spying and data theft features via accessibility services and real-time streaming.
  • Victims are often approached via phone calls and messaging apps like Zalo, with attackers posing as government or utility representatives.

Since October 2024, the financially motivated cybercrime group GoldFactory has been carrying out attacks on mobile users across Indonesia, Thailand, and Vietnam. Their method involves distributing modified banking applications disguised as legitimate government services to install Android malware, as reported by Gold/”>Group-IB.

- Advertisement -

Active since mid-2023, GoldFactory operates under a Chinese-speaking network, linked to malware families such as GoldPickaxe, GoldDigger, and GoldDiggerPlus. They share some common targets and tactics with another malware called Gigabud, despite significant differences in code. Initial cases emerged in Thailand, followed by Vietnam and then Indonesia, where more than 11,000 infections were identified from over 3,000 artifacts in nearly 300 unique banking app samples. Approximately 63% of these apps targeted Indonesian users.

The infection process typically starts with the attackers impersonating government entities or trusted local brands. Victims receive phone calls requesting urgent actions, like paying overdue electricity bills, and are directed to messaging apps such as Zalo to receive download links. One example involved fraudsters pretending to represent Vietnam’s public power company EVN, warning users about bill suspensions.

Following the link, victims are sent to fake app store pages that install remote access trojans like Gigabud, MMRat, or Remo. These trojans exploit Android’s accessibility services, allowing attackers to control devices remotely. The malware is embedded within legitimate banking apps by injecting malicious code only in parts of the software to evade detection and maintain normal app functionality.

Three malware variants, named FriHook, SkyHook, and PineHook, use frameworks such as Frida, Dobby, and Pine to modify app behavior. These hooks enable hiding accessibility service activations, blocking screencast detection, faking app signatures, and concealing installation sources while stealing account balances.

- Advertisement -

Further investigations uncovered a testing version of a new malware called Gigaflower, which supports around 48 commands. It allows live screen streaming via WebRTC, keylogging, user interface reading, gesture emulation, faking system prompts to capture personal data, and uses text recognition to extract information from IDs. It also includes a QR code scanner designed to read Vietnamese identity card codes.

GoldFactory has reportedly stopped deploying custom iOS trojans. Instead, they instruct victims to use an Android device owned by someone close to them, likely due to tougher iOS security and app store restrictions. According to researchers, “The use of legitimate frameworks such as Frida, Dobby, and Pine to modify trusted banking applications demonstrates a sophisticated yet low-cost approach that allows cybercriminals to bypass traditional detection and rapidly scale their operation.”

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

StarkNet suffers second 2025 outage; block reorg rolls back.

Starknet suffered a temporary mainnet outage tied to a state mismatch between its execution...

MSCI Keeps Crypto Treasuries in Index; MSTR Surges After Buy

MSCI decided not to exclude Bitcoin and crypto-treasury companies from its indexes, saying more...

Bitcoin whales trim longs, signaling classic Wyckoff springs

Bitfinex whale long positions fell after peaking near 73,000 BTC in late December.Historical patterns...

BRICS Moves Aim to Dent US Dollar’s Global Dominance Unfolds

BRICS members are testing multiple measures to cut reliance on the US dollar in...

Betterment warns: disregard unauthorized crypto promotion now

Betterment warned customers to ignore an unauthorized crypto promotion message sent via a third-party...
- Advertisement -

Must Read

The Best Bitcoin Casinos of 2025: An Expert’s Data-Driven Guide

Key TakeawaysA Deep Dive into the Top Bitcoin Casinos of 2025Bitcoin Casino Comparison Table1. Stake.com: Best for Variety & Integrated Sports Betting2. BC.Game: Best...
Bitcoin (BTC) $ 90,410.00 0.17%
Ethereum (ETH) $ 3,083.51 0.33%
XRP (XRP) $ 2.09 0.38%
Bittensor (TAO) $ 279.69 0.15%
Polkadot (DOT) $ 2.11 1.69%
Cardano (ADA) $ 0.38916 0.33%
Chainlink (LINK) $ 13.19 0.71%
Hyperliquid (HYPE) $ 24.16 3.43%
Monero (XMR) $ 470.04 3.62%
Hedera (HBAR) $ 0.118494 0.44%
Toncoin (TON) $ 1.75 0.42%