BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

GoldFactory Targets SE Asian Users with Malware-Linked Fake Bank Apps

GoldFactory cybercrime group targets Southeast Asian mobile users with advanced Android malware in fake government apps to steal data and bypass security.

  • The cybercrime group GoldFactory targets mobile users in Indonesia, Thailand, and Vietnam through fake government service apps.
  • Modified banking apps embed Android Malware using frameworks like Frida, Dobby, and Pine to manipulate legitimate apps and bypass security.
  • Over 11,000 infections have been linked to more than 300 malware samples, mostly affecting the Indonesian market.
  • A new malware variant called Gigaflower offers advanced spying and data theft features via accessibility services and real-time streaming.
  • Victims are often approached via phone calls and messaging apps like Zalo, with attackers posing as government or utility representatives.

Since October 2024, the financially motivated cybercrime group GoldFactory has been carrying out attacks on mobile users across Indonesia, Thailand, and Vietnam. Their method involves distributing modified banking applications disguised as legitimate government services to install Android malware, as reported by Gold/”>Group-IB.

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading

Active since mid-2023, GoldFactory operates under a Chinese-speaking network, linked to malware families such as GoldPickaxe, GoldDigger, and GoldDiggerPlus. They share some common targets and tactics with another malware called Gigabud, despite significant differences in code. Initial cases emerged in Thailand, followed by Vietnam and then Indonesia, where more than 11,000 infections were identified from over 3,000 artifacts in nearly 300 unique banking app samples. Approximately 63% of these apps targeted Indonesian users.

The infection process typically starts with the attackers impersonating government entities or trusted local brands. Victims receive phone calls requesting urgent actions, like paying overdue electricity bills, and are directed to messaging apps such as Zalo to receive download links. One example involved fraudsters pretending to represent Vietnam’s public power company EVN, warning users about bill suspensions.

Following the link, victims are sent to fake app store pages that install remote access trojans like Gigabud, MMRat, or Remo. These trojans exploit Android’s accessibility services, allowing attackers to control devices remotely. The malware is embedded within legitimate banking apps by injecting malicious code only in parts of the software to evade detection and maintain normal app functionality.

Three malware variants, named FriHook, SkyHook, and PineHook, use frameworks such as Frida, Dobby, and Pine to modify app behavior. These hooks enable hiding accessibility service activations, blocking screencast detection, faking app signatures, and concealing installation sources while stealing account balances.

- Advertisement -

Further investigations uncovered a testing version of a new malware called Gigaflower, which supports around 48 commands. It allows live screen streaming via WebRTC, keylogging, user interface reading, gesture emulation, faking system prompts to capture personal data, and uses text recognition to extract information from IDs. It also includes a QR code scanner designed to read Vietnamese identity card codes.

GoldFactory has reportedly stopped deploying custom iOS trojans. Instead, they instruct victims to use an Android device owned by someone close to them, likely due to tougher iOS security and app store restrictions. According to researchers, “The use of legitimate frameworks such as Frida, Dobby, and Pine to modify trusted banking applications demonstrates a sophisticated yet low-cost approach that allows cybercriminals to bypass traditional detection and rapidly scale their operation.”

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Apple Urges iPhone Users Update iOS on Coruna, DarkSword Threats

Apple is urging users of outdated iOS versions to update their iPhones immediately to...

Metals at a Crossroads: Gold, Silver to Soar New Highs or Plunge?

Analyst Rashad Hajiyev warns Gold and silver are at a critical point, needing to...

Kentucky Wallet Rules Face Backlash Over “Impossible” Mandate

A proposed bill amendment in Kentucky would require hardware wallet makers to provide a...

FBI Impersonators Target Tron Users in Asset-Freeze Scam

Scammers are impersonating the Federal Bureau of Investigation using a fraudulent token on the...

Bitcoin’s $136K ‘Fair Value’ Clashes With Tight Monetary Policy

Bitcoin's price is at a historic divergence from global M2 money supply growth, with...

Must Read

Are Cryptocurrency Securities?

TL;DR - Cryptocurrencies are not typically considered securities, as they are decentralized digital assets that operate independently of any central authority or government. However,...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading