BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

GoldFactory Targets SE Asian Users with Malware-Linked Fake Bank Apps

GoldFactory cybercrime group targets Southeast Asian mobile users with advanced Android malware in fake government apps to steal data and bypass security.

  • The cybercrime group GoldFactory targets mobile users in Indonesia, Thailand, and Vietnam through fake government service apps.
  • Modified banking apps embed Android Malware using frameworks like Frida, Dobby, and Pine to manipulate legitimate apps and bypass security.
  • Over 11,000 infections have been linked to more than 300 malware samples, mostly affecting the Indonesian market.
  • A new malware variant called Gigaflower offers advanced spying and data theft features via accessibility services and real-time streaming.
  • Victims are often approached via phone calls and messaging apps like Zalo, with attackers posing as government or utility representatives.

Since October 2024, the financially motivated cybercrime group GoldFactory has been carrying out attacks on mobile users across Indonesia, Thailand, and Vietnam. Their method involves distributing modified banking applications disguised as legitimate government services to install Android malware, as reported by Gold/”>Group-IB.

- Advertisement -

Active since mid-2023, GoldFactory operates under a Chinese-speaking network, linked to malware families such as GoldPickaxe, GoldDigger, and GoldDiggerPlus. They share some common targets and tactics with another malware called Gigabud, despite significant differences in code. Initial cases emerged in Thailand, followed by Vietnam and then Indonesia, where more than 11,000 infections were identified from over 3,000 artifacts in nearly 300 unique banking app samples. Approximately 63% of these apps targeted Indonesian users.

The infection process typically starts with the attackers impersonating government entities or trusted local brands. Victims receive phone calls requesting urgent actions, like paying overdue electricity bills, and are directed to messaging apps such as Zalo to receive download links. One example involved fraudsters pretending to represent Vietnam’s public power company EVN, warning users about bill suspensions.

Following the link, victims are sent to fake app store pages that install remote access trojans like Gigabud, MMRat, or Remo. These trojans exploit Android’s accessibility services, allowing attackers to control devices remotely. The malware is embedded within legitimate banking apps by injecting malicious code only in parts of the software to evade detection and maintain normal app functionality.

Three malware variants, named FriHook, SkyHook, and PineHook, use frameworks such as Frida, Dobby, and Pine to modify app behavior. These hooks enable hiding accessibility service activations, blocking screencast detection, faking app signatures, and concealing installation sources while stealing account balances.

- Advertisement -

Further investigations uncovered a testing version of a new malware called Gigaflower, which supports around 48 commands. It allows live screen streaming via WebRTC, keylogging, user interface reading, gesture emulation, faking system prompts to capture personal data, and uses text recognition to extract information from IDs. It also includes a QR code scanner designed to read Vietnamese identity card codes.

GoldFactory has reportedly stopped deploying custom iOS trojans. Instead, they instruct victims to use an Android device owned by someone close to them, likely due to tougher iOS security and app store restrictions. According to researchers, “The use of legitimate frameworks such as Frida, Dobby, and Pine to modify trusted banking applications demonstrates a sophisticated yet low-cost approach that allows cybercriminals to bypass traditional detection and rapidly scale their operation.”

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Hayes: U.S.-Iran Conflict May Tank Bitcoin Before Liquidity Surge

Arthur Hayes described markets as being in a 'no trade zone' due to geopolitical...

Justin Sun decries “tyranny” in Trump-linked WLFI vote

World Liberty Financial proposed burning 4.5 billion WLFI tokens and restructuring vesting for 62...

Crypto Market-Maker Deal Disclosures Virtually Absent

Market-making arrangements are disclosed by fewer than 1% of crypto protocols, a rate dramatically...

New Ukraine Cyberattack Targets Government, Healthcare Data

Ukraine's CERT-UA exposed a malware campaign targeting government and healthcare bodies, culminating in a...

Errol Musk Reveals Elon, Kimbal Own $1.6B in Bitcoin

Errol Musk revealed that his sons, Elon and Kimbal, hold approximately $1.6 billion in...

Must Read

Tutorial: How to Buy a Domain Name Permanently? (Super Easy)

Are you ready to establish a permanent online presence and you want to buy a domain forever?In this tutorial, we'll show you how to...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading