iOS users beware: GoldPickaxe trojan steals your facial data

Group-IB uncovered a new iOS trojan designed to steal users’ facial recognition data, identity documents, and intercept SMS.

GoldPickaxe

The trojan, dubbed GoldPickaxe.iOS by Group-IB’s Threat Intelligence unit, has been attributed to a Chinese-speaking threat actor codenamed GoldFactory, responsible for developing a suite of highly sophisticated banking trojans that also includes the earlier discovered GoldDigger and newly identified GoldDiggerPlus, GoldKefu, and GoldPickaxe for Android. To exploit the stolen biometric data, the threat actor utilizes AI face-swapping services to create deepfakes by replacing their faces with those of the victims.

Cybercriminals could use this method to gain unauthorized access to the victim’s banking account – a new fraud technique previously unseen by Group-IB researchers. The GoldFactory trojans target the Asia-Pacific region, specifically — Thailand and Vietnam, impersonating local banks and government organizations.

Group-IB’s discovery also marks a rare instance of malware targeting Apple’s mobile operating system.

GoldPickaxe.iOS trojan targets victims in the Asia-Pacific region

Group-IB’s report about GoldDigger released in October 2023 suggested that the expansion of GoldDigger would extend beyond Vietnam. Within less than a month, Group-IB’s Threat Intelligence unit identified a new iOS malware variant targeting victims from Thailand, subsequently named GoldPickaxe.iOS. Along with the iOS trojan, the Group-IB team identified an Android version of GoldPickaxe, named GoldPickaxe.Android.

In February 2024, news emerged that a Vietnamese citizen fell victim to malware. The individual carried out the operations requested by the application, including a facial recognition scan. As a result, cybercriminals withdrew money equivalent to more than 40,000 USD. While Group-IB doesn’t have direct evidence of GoldPickaxe’s distribution in Vietnam, the unique feature mentioned in the news suggests that GoldPickaxe has most likely reached Vietnam.

Overall, Group-IB identified four trojan families and maintained the naming convention by using the prefix Gold for the newly discovered malware as a symbolic representation that they have been developed by GoldFactory.

GoldPickaxe.iOS disguised as Thai government service apps

GoldPickaxe.iOS disguised as Thai government service apps (including the Digital Pension app as reported by the Thailand Banking Sector CERT) requests the user to create a comprehensive facial biometric profile and take a photo of their identity card. Additionally, the threat actor requests the phone number to get more details about the victims, specifically seeking information about banking accounts associated with the victim.

The distribution strategy adopted by GoldPickaxe.iOS stands out. Initially leveraging Apple’s mobile application testing platform, TestFlight, the threat actor shifted to a more advanced approach post-removal of their malicious app from the platform. Group-IB researchers note that the threat actor does not exploit any vulnerabilities. Instead, GoldFactory employs a multi-stage social engineering scheme to manipulate victims into granting all the necessary permissions, enabling the installation of malware.

Through this scheme, victims were persuaded to install a Mobile Device Management (MDM) profile, granting the threat actor complete control over their devices. MDM offers a wide range of features such as remote wipe, device tracking, and application management, which the cybercriminals take advantage of to install malicious applications and gain the information they need.

It is of note that GoldPickaxe.iOS is the first iOS trojan observed by Group-IB that combines the following functionalities: collecting victims’ biometric data, ID documents, intercepting SMS, and proxying traffic through the victims’ devices. Its Android sibling has even more functionalities than its iOS counterpart, due to more restrictions and the closed nature of iOS.

GoldPickaxe doesn’t directly steal the money from the victim’s phone. Instead, it collects all the necessary information from the victim to create video deepfakes and autonomously access the victim’s banking application. Facial recognition is actively used by Thai financial organizations for transaction verification and login authentication.

During the research, Group-IB established that the trojan unequivocally possesses the capability to prompt victims to scan their faces and submit ID photos. Nevertheless, Group-IB researchers have not observed documented cases of cybercriminals utilizing this stolen data to gain unauthorized access to victims’ bank accounts in the wild. Group-IB’s hypothesis suggests that the cybercriminals are using their own, allegedly Android, devices to log into victims’ bank accounts.

The Thai police confirmed Group-IB’s assumption, stating that cybercriminals are installing banking applications on their own Android devices and using captured face scans to bypass facial recognition checks and carry out unauthorized access to victim accounts.

GoldDigger family grows

After the initial discovery of the GoldDigger trojan in June 2023, Group-IB’s Threat Intelligence unit has identified a new advanced variant of this Android malware – GoldDiggerPlus. Its first known sample detected in September 2023 had an embedded second trojan inside that Group-IB named GoldKefu as “kefu” means customer service in Chinese and this string appears in its codes recurrently. GoldDiggerPlus and Kefu work in tandem to execute their full capabilities.

In contrast with GoldDigger which relies on Accessibility Service, GoldDiggerPlus and GoldKefu use web fakes impersonating 10 Vietnamese banks to collect banking credentials. GoldKefu checks if the most recently opened application on the infected device belongs to the list of targeted banking apps and a fake overlay login page that mimics a legitimate application will be launched instead if a match is found. Notably, GoldKefu also allows cybercriminals to send victims fake alerts and call them in real time.

When the victim clicks on the contact customer service button fake alert, GoldKefu checks if the current time falls within the working hours of the cybercriminals. If it does, the malware will try to find a free operator to call through. Thus, it is believed that GoldFactory might be engaging operators proficient in Thai and Vietnamese or even possibly running a call center.

Group-IB attributes the entire threat cluster to a single, highly sophisticated Chinese-speaking threat actor dubbed GoldFactory. Debugging strings in Chinese were found throughout all the malware variants and their C2 panels were also in Chinese.

GoldFactory is a resourceful team adept at various tactics, including impersonation, accessibility keylogging, fake banking websites, fake bank alerts, fake call screens, identity, and facial recognition data collection. The team comprises separate development and operator groups dedicated to specific regions.

The announcement of Thailand’s policy on facial biometric verification, released in March 2023 and enforced by July, coincided with the discovery of the earliest traces of GoldPickaxe in early October. A total of three months was enough for the group to research, develop, and test new facial recognition data collection features.

Additionally, during the analysis of GoldFactory’s trojans, Group-IB researchers found similarities between the gang’s malware and Gigabud – a disruptive banking trojan targeting Thailand, Vietnam as well as some countries in Latin America. However, there is not enough evidence to attribute the initial development of Gigabud to GoldFactory at this point, and, according to Group-IB researchers, GoldFactory is most likely involved in its distribution.

“The surge in mobile trojans targeting the Asia-Pacific region can be attributed to GoldFactory. The gang has well-defined processes and operational maturity and constantly enhances its toolset to align with the targeted environment showcasing a high proficiency in malware development. The discovery of a sophisticated iOS trojan highlights the evolving nature of cyber threats targeting the Asia-Pacific region. In our assessment, it appears imminent that GoldPickaxe will soon reach Vietnam’s shores, while its techniques and functionality will be actively incorporated into malware targeting other regions,” said Andrey Polovinkin, Malware Analyst, Threat Intelligence team, Group-IB.

OPIS

Subscribe to the Help Net Security breaking news e-mail alerts:

OPIS

Don't miss