Operation BlackEcho: Voice Phishing Using Fake Financial and Vaccine Apps

BBlack Hat
253,000
762 views
23 likes
5 months ago
37:19

Description

Researchers from the Financial Security Institute analyze Operation BlackEcho, a multi-stage Android malware campaign targeting South Korean users via voice phishing (vishing). The presentation details the evolution of these malicious apps, their sophisticated infrastructure utilizing Cloudflare, and the social engineering tactics used to defraud victims of significant funds.

Operation BlackEcho: Deconstructing the Multi-Stage Android Vishing Threat

Introduction

Voice phishing, or "vishing," has evolved far beyond simple prank calls or basic social engineering. In South Korea, it has become a highly industrialized criminal enterprise. Operation BlackEcho, a campaign tracked by the Financial Security Institute (FSI), represents the cutting edge of this threat. While the volume of attacks may be dipping, the precision and profitability have reached alarming levels, with individual victims losing an average of $27,000 USD.

This blog post explores the inner workings of Operation BlackEcho, a campaign that uses multi-stage Android malware to hijack the very concept of a "trusted connection." By combining sophisticated mobile exploits with psychological manipulation, the BlackEcho group has created a blueprint for modern financial fraud. We will dive into the malware architecture, the infrastructure tactics used to evade detection, and the defense strategies necessary to combat this growing menace. This analysis is intended for security researchers, mobile developers, and financial fraud analysts seeking to understand the mechanics of high-impact vishing.

Background & Context

South Korea's highly digitized financial ecosystem makes it a prime target for mobile-centric fraud. Most citizens conduct their banking through mobile apps, which often require the installation of security software (locally known as "vaccine apps"). Operation BlackEcho exploits this cultural norm by disguising its secondary malicious payload as a mandatory vaccine app.

The "Echo" in the operation's name refers to the escalating nature of the attack: a single social engineering lure (the "Black" landing page) triggers a series of malware installations that echo back as a massive, coordinated fraud attempt. The risk is not merely the loss of credentials but the total compromise of the device's communication channels, allowing attackers to intercept real calls and fabricate fake ones in real-time.

Technical Deep Dive

Understanding the Multi-Stage Architecture

Operation BlackEcho does not rely on a single monolithic APK. Instead, it uses a tiered approach to bypass security filters and maintain persistence.

  1. The 1st App (The Bait): Disguised as a reputable financial institution (like IBK or a Credit Union) or a government agency (Cyber Crime Investigation), this app is delivered via smishing (SMS phishing) or social media ads. It uses three methods to display content: local HTML files stored in the assets, standard Android layouts, or external phishing pages. Its primary role is to steal PII (Personally Identifiable Information) and act as a downloader or dropper for the next stage.
  2. The 2nd App (The Weapon): To avoid detection, the group eventually split the 2nd app into two: 2nd_main and 2nd_call.
    • 2nd_main: Focuses on command execution. It handles remote control, streaming of the camera and microphone, and data exfiltration.
    • 2nd_call: Dedicated solely to vishing. It sets itself as the default dialer to manage call logs and call interception.

Exploitation via Accessibility Services

A cornerstone of BlackEcho's success is the abuse of Android's Accessibility Service. By tricking the user into enabling this service, the malware can grant itself all necessary permissions (contacts, SMS, call logs) and even click through installation prompts for the secondary apps without any further user interaction. This creates a "zero-touch" infection chain after the initial lure is successful.

Call Interception and ARS Spoofing

The most impressive—and dangerous—feature is the call interception mechanism. When a victim attempts to call their bank to verify a loan offer, the 2nd_call app intercepts the outgoing intent. It terminates the real call and instead establishes a connection to the attacker's SIP server. To keep the illusion alive, the app plays ARS (Audio Response System) MP3 files stored locally. The victim hears the familiar "Thank you for calling [Bank Name], please hold for the next available agent," while they are actually being connected directly to a scammer.

Infrastructure Obfuscation

The BlackEcho group utilizes a 6-server model to stay resilient:

  • Discovery Server: This is the most critical link. Instead of hardcoding C2 addresses, the app queries a discovery server. The response is encoded using Base64 and a custom XOR algorithm. This allows the attackers to rotate their C2 and streaming servers daily, effectively nullifying IP-based blocking.
  • Cloudflare Abuse: All servers sit behind Cloudflare's proxy and tunneling services. This hides the true origin IP of the attackers and makes it difficult for security researchers to identify the hosting provider or take down the backend infrastructure.

Mitigation & Defense

Defending against Operation BlackEcho requires a multi-layered "Phishing Kill Chain" approach:

  1. Detection: Security teams must monitor for the creation of new landing pages that mimic official Google Play layouts. Tools like URLScan.io and Criminal IP are vital for identifying these early.
  2. Infrastructure Blocking: Since the attackers use dynamic discovery, defenders must focus on the discovery server's unique communication patterns and URI structures (which often involve epoch timestamps or bank-specific keywords like IBK or CCI).
  3. User Education: Financial institutions must educate users that they will never ask for the installation of an app via an SMS link. Users should also be warned to never grant Accessibility Service permissions to apps outside of legitimate assistive tools.
  4. Collaboration: Sharing threat intelligence with organizations like KISA and local law enforcement is essential for cross-industry blocking of distribution domains.

Conclusion & Key Takeaways

Operation BlackEcho is a sobering reminder that vishing is no longer just a social engineering problem—it is a sophisticated technical challenge. The group's ability to split malware functionality, abuse Android system services, and obfuscate infrastructure via Cloudflare demonstrates a high level of operational maturity.

Key takeaways include:

  • Malware Split: Attackers are moving toward modular app architectures to evade detection.
  • Infrastructure Agility: The use of discovery servers and XOR encoding makes static analysis and IP blocking less effective.
  • Trust Hijacking: By intercepting outgoing calls, attackers eliminate the victim's ability to verify information through trusted channels.

As defenders, we must evolve as quickly as the attackers. Sharing intelligence and strengthening mobile OS security models are the only ways to break the Echo. Stay vigilant, and never download financial apps from unknown URLs.

AI Summary

This presentation explores 'Operation BlackEcho,' a sophisticated voice phishing (vishing) campaign active since late 2021, primarily targeting South Korean citizens. The researchers from the Financial Security Institute (FSI) explain that while the total number of vishing cases in Korea has decreased, the financial damage per case has skyrocketed, reaching nearly $27,000 USD on average. The operation is named 'BlackEcho' due to the black-themed C2 landing pages and the 'echo' effect where an initial small infection leads to increasingly larger attacks. The technical core of the presentation focuses on the multi-stage malware architecture. The attackers distribute a '1st App' disguised as a financial institution or government agency. This app acts as either a dropper or a downloader, installing a '2nd App' while simultaneously stealing personal information like names, phone numbers, and social security numbers. Over time, the functionality evolved; by 2024, the 2nd app was split into two components: a '2nd_main' app for command execution (remote control, streaming, data theft) and a '2nd_call' app dedicated to vishing operations. A critical vulnerability exploited by these apps is the Android Accessibility Service, which the malware abuses to grant itself permissions and install additional payloads without user consent. The vishing tactics are particularly advanced. The malware sets itself as the default phone application to intercept outgoing calls (e.g., to a bank's customer service) and redirect them to the attacker. It also manages fake incoming calls, making them appear as if they originate from legitimate authorities like the police. The apps utilize pre-recorded ARS (Audio Response System) files—over 90 of which were found in the assets—to mimic bank menus and build trust with the victim. Infrastructure analysis reveals a complex 6-server ecosystem including landing pages, distribution servers (using services like Catbox and Gofile), phishing pages, discovery servers, C2 servers, and streaming servers. The attackers leverage Cloudflare's proxy and tunneling features to obfuscate their backend and evade detection. The discovery server uses a Base64 and XOR-based decoding algorithm to provide the app with the dynamic addresses of the C2 and streaming servers, allowing the attackers to rotate infrastructure without redistributing the malware. Finally, the researchers detail the 'Phishing Kill Chain' used for mitigation, which involves monitoring for new IP addresses, extracting app information, and collaborating with organizations like KISA (Korea Internet & Security Agency) to block access to malicious domains. They emphasize that cybersecurity is a shared responsibility between researchers, financial institutions, and the public.

More from this Playlist

Behind Closed Doors - Bypassing RFID Readers
42:04
Travel & Eventsresearch-presentationhybridrfid
DriveThru Car Hacking: Fast Food, Faster Data Breach
36:35
Travel & Eventsresearch-presentationhybriddashcam
Impostor Syndrome - Hacking Apple MDMs Using Rogue Device Enrolments
34:53
Travel & Eventsresearch-presentationhybridapple
Dismantling the SEOS Protocol
26:50
Travel & Eventsresearch-presentationtechnical-deep-diverfid
The ByzRP Solution: A Global Operational Shield for RPKI Validators
47:04
Travel & Eventsresearch-presentationtechnical-deep-divebgp
Powered by Kuboid

We break your app
before they do.

Kuboid is a cybersecurity agency that finds hidden vulnerabilities before real attackers can exploit them. Proactive security testing, so you can ship with confidence.

Get in Touch

Trusted by the security community • Visit kuboid.in