Cybercriminals Exploit .NET MAUI to Deploy Malicious Banking and Social Media Apps Targeting Indian and Chinese Users

In a concerning development, cybersecurity experts have identified a sophisticated Android malware campaign that leverages Microsoft’s .NET Multi-platform App UI (.NET MAUI) framework to create counterfeit banking and social media applications. These malicious apps are specifically designed to target users in India and Chinese-speaking regions, aiming to steal sensitive personal and financial information.

Understanding .NET MAUI and Its Misuse

.NET MAUI is a cross-platform framework developed by Microsoft, enabling developers to build native applications for Android, iOS, macOS, and Windows using a single codebase written in C# and XAML. This framework is an evolution of Xamarin, offering enhanced capabilities for creating multi-platform apps. Notably, official support for Xamarin concluded on May 1, 2024, prompting developers to transition to .NET MAUI.

While .NET MAUI offers legitimate developers a streamlined approach to app development, cybercriminals have begun exploiting its features to craft malicious applications. By utilizing .NET MAUI, these threat actors can develop apps with core functionalities written entirely in C#, stored as binary large objects (BLOBs). This approach allows the malicious code to evade traditional detection methods that typically scan for harmful code in DEX files or native libraries.

The Emergence of FakeApp: A New Breed of Malware

The malicious applications, collectively referred to as “FakeApp,” have been identified with various package names, including:

– X (pkPrIg.cljOBO)
– 迷城 (pCDhCg.cEOngl)
– Cupid (pommNC.csTgAT)
– 私密相册 (pBOnCi.cUVNXz)
– Indus Credit Card (indus.credit.card)

These apps are not distributed through official channels like the Google Play Store. Instead, cybercriminals employ social engineering tactics, such as sending deceptive links via messaging platforms, to lure users into downloading these malicious applications from unofficial app stores or third-party websites.

Deceptive Tactics and Data Theft Mechanisms

Once installed, these counterfeit apps mimic legitimate banking or social media platforms to gain users’ trust. For instance, an app posing as an Indian financial institution prompts users to enter personal and financial details, including:

– Full names
– Mobile numbers
– Email addresses
– Dates of birth
– Residential addresses
– Credit card numbers
– Government-issued identification numbers

Similarly, an app impersonating the social media platform X targets Chinese-speaking users, aiming to extract contacts, SMS messages, and photos from their devices.

To transmit the stolen data, these apps utilize encrypted socket communication, sending the information to command-and-control (C2) servers operated by the attackers. Additionally, the malware employs obfuscation techniques, such as adding meaningless permissions to the AndroidManifest.xml file (e.g., “android.permission.LhSSzIw6q”), to evade detection and analysis.

Advanced Evasion Techniques

The malware incorporates multi-stage dynamic loading to further conceal its presence. This involves an XOR-encrypted loader that decrypts and executes an AES-encrypted payload, which subsequently loads the .NET MAUI assemblies containing the malicious code. This layered approach complicates detection and analysis, allowing the malware to operate stealthily on infected devices.

Implications and Recommendations

The exploitation of .NET MAUI by cybercriminals underscores the evolving nature of cyber threats and the need for heightened vigilance. Users are advised to:

– Download Apps from Trusted Sources: Only install applications from official app stores and verify the authenticity of the developer.
– Be Cautious with Links: Avoid clicking on unsolicited links received via messaging apps or emails.
– Regularly Update Devices: Keep operating systems and applications updated to benefit from the latest security patches.
– Use Security Software: Install reputable antivirus and anti-malware software to detect and prevent malicious activities.

By adopting these practices, users can significantly reduce the risk of falling victim to such sophisticated malware campaigns.