ECONOMY & WORK
MONEY 101
NEWS
PERSONAL FINANCE
NET WORTH
About Us Contact Us Privacy Policy Terms of Use DMCA Opt-out of personalized ads
© Copyright 2023 Market Realist. Market Realist is a registered trademark. All Rights Reserved. People may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.
MARKETREALIST.COM / NEWS

New Malware 'GoldPickaxe' Is Stealing People's Faces To Create Deepfakes For Bank Fraud

The attacks specifically target the Asia-Pacific region but they can spread to other regions as well.
PUBLISHED FEB 16, 2024
Cover Image Source: Output of an Artificial Intelligence system | Getty Images | Photo by Smith Collection
Cover Image Source: Output of an Artificial Intelligence system | Getty Images | Photo by Smith Collection

A new malware is circulating on Android and iOS devices that is capable of stealing victims' faces and biometric data to generate deepfakes and gain unauthorized bank access or to steal identity or files. The trojan called "GoldPickaxe" was discovered by a software company called Group IB. While the company's Threat Intelligence team noted that the attacks specifically target the Asia-Pacific region, with victims in Thailand and Vietnam, the malware is projected to spread across the globe.

A 3D facial recognition program is demonstrated during the Biometrics 2004 exhibition | Getty Images | Photo by Ian Waldie
A 3D facial recognition program is demonstrated during the Biometrics 2004 exhibition | Getty Images | Photo by Ian Waldie

The distribution of the "Gold Pickaxe" trojan is thought to have commenced around October 2023 and remains ongoing. This activity is linked to the broader GoldFactory campaign, that was initiated in June 2023, with the deployment of another trojan known as "Gold Digger."



 

Once installed onto an Android device, the trojan takes the form of a fake government app. It then operates semi-autonomously, manipulating functions in the background, capturing the victim's face, intercepting SMS, asking for ID documents, and proxying network traffic through the infected device.

On iOS devices, however, the malware establishes a web socket and carries out various commands. These include sending device information, requesting the victim to take an image of their ID card, requesting a video of their face, displaying a bogus "device in use" message, accessing a photo library, and more.

However, as per the Android version, the trojan performs more malicious activities using over 20 different bogus apps as cover. Apple, on the other hand, has higher security restrictions, limiting the trojan’s operation.

Pexels | Tara Winstead
Pexels | Photo by Tara Winstead

In the scam, victims are approached through phishing or smishing messages written in their native language on the LINE app. These messages impersonate government authorities or services. The scammers then attempt to trick the victims into installing fraudulent apps disguised as "Digital Pension" apps, hosted on websites impersonating Google Play. The malware gains access to the victim’s device and can carry out criminal operations.

For instance, a victim in Hanoi, Vietnam, received a call from a person claiming to be a government official, according to a local news report. The imposter then asked the man to integrate an identification code at home and download fake Public Service software. The man went on to execute the app’s instructions, including scanning the camera to identify the face. The next day, he discovered that the stock account he had installed on his phone had lost control, and about 3 billion VND (approximately $122,424) in the account was transferred elsewhere.

Representative image Jack Ma presenting a new facial recognition feature of the Alibaba portal | Getty Images | Photo by Sean Gallup
Jack Ma presenting a new facial recognition feature | Getty Images | Photo by Sean Gallup

According to Group IB, the application uses the stolen biometric data for AI face-swapping services to create deepfakes of the victims. This allows the scammers to autonomously access the victim’s banking application as facial recognition is actively used by Thai financial organizations for verification.

Group-IB attributes the fraud to the highly sophisticated Chinese-speaking threat group, "GoldFactory" as debugging strings found in the malware variants included prompts in the Chinese language. GoldFactory, also responsible for developing other malware strains such as "GoldDigger," "GoldDiggerPlus," and "GoldKefu," uses various tactics, including impersonation, creating and using fake banking websites, using fake bank alerts, using fake call screens, and more. Reportedly, the group has separate development and operator groups dedicated to specific regions.



 

Group-IB researchers also found similarities between Goldfactory’s malware and "Gigabud," a disruptive banking trojan operating in Thailand, Vietnam, and some countries in Latin America. However, there is not enough evidence to attribute the development of Gigabud to GoldFactory yet. However, suspicions of it being involved in distribution remain.

MORE ON MARKET REALIST
Robert Herjavec and Lori Greiner rubbed it in O'Leary's face by celebrating their deal with Phoozy
17 hours ago
Duc and Lisa Nguyen's stubbornness paid off, as the co-founders of Baubles + Soles got Daymond John as a partner.
19 hours ago
The player got the host to be candid about his fears and his mother's opinion on him.
21 hours ago
Justin Baer, founder of Collars & Co., was looking for mentorship from the Sharks in addition to a $300,000 investment.
22 hours ago
She said that her husband may still have to buy a dog as America may hold him accountable.
1 day ago
When Harrison knew that the 18th-century map was the real deal, he made a genuine offer.
1 day ago
10 years after her sister’s win, Chelsea Hall hit the jackpot on ‘WoF’ with a brand new Mini Cooper and a cash prize.
1 day ago
The co-founders of BuggyBeds wowed the Sharks so much, they were "itching" to invest, and offered a $250k deal.
1 day ago
The guests were left stunned to find out just how much the repairs would cost.
2 days ago
Unfortunately for the seller, she allegedly got robbed of a significant amount of money.
2 days ago
Not only did the co-creators of FlingGolf get a $300,000 deal, they proved Mr Wonderful wrong.
2 days ago
The guest never imagined the old, autographed sneakers that his mom acquired could be worth so much.
3 days ago
The gameshow whiz did it again by bagging the top prize on yet another trivia test.
3 days ago
Riccardi took to Reddit to clear the air around his stunning loss which was facing scrutiny.
3 days ago
Fans gathered on the show's unofficial Reddit forum to discuss the 'dumb and useless' items.
4 days ago
The contestant, Matt Benton expressed he wanted to enjoy the moment before thinking of the future.
4 days ago
The guest who treasured the collection had no idea how significant it was.
4 days ago
Even the contestant admitted that there was no way he could've got the answer.
4 days ago
Jennings told TV Insider that Seacrest is a generational talent and there's nothing he couldn't do.
5 days ago
The co-founders of 'Bro Glo' managed to bag the biggest Shark for their innovative self-tanner.
5 days ago