Rising Threat of Poisoned Banking Apps
A new wave of cyberattacks is emerging in which malicious banking apps are secretly compromising users’ phones without their knowledge. These “poisoned” apps, disguised as legitimate banking applications, are being spread via phishing links and fake government websites, putting thousands of users at risk. While on the surface these apps may seem familiar and safe, they harbour hidden mechanisms that make phones vulnerable to malicious actors.
Security researchers have recently revealed a disturbing trend: hackers are reverse-engineering legitimate banking apps, inserting malicious code, and then reassembling them to trick unsuspecting users into downloading the compromised version. Once installed, the app operates normally, but secretly allows attackers to access personal information, control the phone, and steal login credentials. This practice is a reminder that the cybersecurity landscape is constantly evolving, and even well-established online protections are not foolproof.
How the Attack Works: A Step-By-Step Breakdown
The attackers behind this technique are part of a group known as GoldFactory, according to cybersecurity firm Group-IB. GoldFactory has been linked to a series of sophisticated attacks targeting mobile banking users. Here’s how the process works:
- Reverse Engineering of Legitimate Apps:
GoldFactory deconstructs real banking apps, inserting malicious code such as Trojans and backdoors into the app’s core. This code allows the attackers to perform actions like screen monitoring, logging keystrokes, and even taking full control of the phone without the user being aware. - Rebuilding the App:
After modifying the original code, the attackers recompile the app, ensuring that the final product appears identical to the legitimate banking app. From the user’s perspective, there are no signs of manipulation—nothing to suggest that the app is anything but the real deal. - Creation of Fake Web Pages:
Once the app is ready, it is distributed through a web page designed to mimic the official bank’s site. The fake page is nearly identical to the legitimate one, with all the necessary details, ensuring that even the most cautious users are easily fooled. - Distribution via Phishing Links and Fake Government Sites:
The malicious app is spread through phishing links sent via email or text, often disguised as urgent messages from government agencies or banks. The fake sites hosting these apps are highly convincing, leading users to believe they are interacting with official, trusted entities.

The Hidden Dangers: Trojans and Spyware
Once the manipulated app is installed on the phone, it operates without raising any red flags. However, in the background, several dangerous programs run silently:
- SkyHook, FriHook, PineHook, and Gigabud Variants
These malicious programs can monitor the phone’s screen, record input, and transmit sensitive data like login credentials to attackers. This allows the hackers to view financial transactions, steal passwords, and even perform actions on behalf of the victim, such as making unauthorized transfers.
This type of attack is unsettling because it is so discreet—users are unaware that their phone has been compromised, and the attackers can access everything from bank accounts to personal files, all while staying undetected.
Global Implications: Not Just an Asia-Pac Issue
While the majority of reported cases have emerged in the Asia-Pacific region, researchers believe that the same techniques could easily be replicated in other parts of the world. This raises concerns that thousands, if not millions, of users could be at risk globally. As mobile banking becomes increasingly popular, the threat of these sophisticated attacks continues to grow.
Mitigating the Risks: What Can You Do to Protect Yourself?
In light of these developments, it’s important for users to remain vigilant and adopt safer habits when using banking apps and handling mobile security. Here are some essential steps to take:
- Download Apps Only from Official Stores:
The safest way to avoid downloading malicious apps is by sticking to trusted app stores, such as the Apple App Store or Google Play Store. Avoid third-party stores or downloading APK files from unknown sources. - Examine the URL Carefully:
Always verify the website’s URL before entering sensitive information. A slight misspelling or unusual domain can indicate a fake site. - Be Cautious with Phishing Links:
Do not click on links from unsolicited emails or text messages, especially those that use urgency or threats (e.g., “Immediate action required”). Verify the source directly through official channels. - Enable Two-Factor Authentication:
Whenever possible, enable two-factor authentication (2FA) for your banking apps and accounts. This adds an extra layer of protection, making it harder for attackers to access your accounts even if they have your credentials. - Regularly Update Your Software:
Keep your phone’s operating system and apps up to date to ensure you have the latest security patches.
The Bigger Picture: GoldFactory’s Evolving Threats
GoldFactory has previously demonstrated its ability to do more than just steal login credentials. This group has been linked to the theft of biometric data, the creation of deepfakes, and other forms of identity fraud. As cybercriminals continuously refine their tactics, it’s crucial to stay ahead of the curve and be cautious about how personal data is shared and stored.
While many of these attacks may seem like a relatively “old school” form of fraud—akin to someone leaving their car door unlocked—the difference is that now the attack is silent, almost invisible. What’s more, the damage done can be far-reaching, as these compromised apps offer direct access to sensitive financial data.
Conclusion: Navigating the New Normal in Cybersecurity
As the cyber threat landscape continues to evolve, users must be more cautious and aware than ever before. While these new methods of attack are alarming, they also serve as a reminder of the importance of maintaining tried-and-true security practices—such as questioning unexpected requests for information, verifying URLs, and avoiding suspicious links.
Despite the growing sophistication of cybercriminals, it’s still possible to navigate the online world safely by staying vigilant and adopting a proactive approach to mobile security. In the fight against fraud and malware, a little everyday suspicion can go a long way.
As we continue to integrate more digital banking and mobile services into our daily lives, a heightened awareness of these threats will help mitigate the risk of becoming a victim of malicious attacks.
Growing Focus on Mobile Security in the Nordic Region
In recent months, the Nordic countries have seen a significant rise in cybercrime targeting mobile users. The region’s growing dependence on digital banking and mobile apps makes it an attractive target for cybercriminals. Governments and financial institutions in countries like Sweden, Denmark, and Finland are beginning to ramp up cybersecurity measures to protect users, but as these sophisticated attacks show, user awareness remains one of the most effective defences.
As these methods of attack continue to evolve, experts suggest that both individuals and organizations should engage in more comprehensive digital hygiene, including educating employees and users about the risks associated with phishing and fraudulent apps. In addition, Nordic countries are considering further strengthening regulations around app security and mobile data protection to stay ahead of emerging threats.
By understanding these emerging threats and adopting more robust cybersecurity practices, Nordic businesses and consumers can mitigate the risk of falling victim to mobile banking fraud.
