Hackers steal banking creds from iOS, Android users via PWA apps

Share:

Threat actors started to use progressive web applications to impersonate banking apps and steal credentials from Android and iOS users.

Progressive web apps (PWA) are cross-platform applications that can be installed directly from the browser and offer a native-like experience through features like push notifications, access to device hardware, and background data syncing.

Using this type of apps in phishing campaigns allows evading detection, bypass app installation restrictions, and gain access to risky permissions on the device without having to serve the user a standard prompt that could raise suspicion.

The technique was first observed in the wild in July 2023 in Poland, while a subsequent campaign that launched in November of the same year targeted Czech users.

Cybersecurity company ESET reports that it is currently tracking two distinct campaigns relying on this technique, one targeting the Hungarian financial institution OTP Bank and the other targeting TBC Bank in Georgia.

However, the two campaigns appear to be operated by different threat actors. One uses a distinct command and control (C2) infrastructure to receive stolen credentials, while the other group logs stolen data via Telegram.

Infection chain

ESET says that the campaigns rely on a broad range of methods to reach their target audience, including automated calls, SMS messages (smishing), and well-crafted malvertising on Facebook ad campaigns.

In the first two cases, the cybercriminals trick the user with a fake message about their banking app being outdated and the need to install the latest version for security reasons, providing a URL to download the phishing PWA.

In the case of malicious advertisements on social media, the threat actors use the impersonated bank’s official mascot to induce a sense of legitimacy and promote limited-time offers like monetary rewards for installing a supposedly critical app update.

Depending on the device (verified via the User-Agent HTTP header), clicking on the ad takes the victim to a bogus Google Play or App Store pag

Clicking on the ‘Install’ button prompts the user to install a malicious PWA posing as a banking app. In some cases on Android, the malicious app is installed in the form of a WebAPK – a native APK generated by Chrome browser.

The phishing app uses the official banking app’s identifiers (e.g. logo legitimate-looking login screen) and even declares Google Play Store as the software source of the app.)

The appeal of using PWAs on mobile

PWAs are designed to work across multiple platforms, so attackers can target a broader audience through a single phishing campaign and payload.

The key benefit, though, lies in bypassing Google’s and Apple’s installation restrictions for apps outside the official app stores, as well as “install from unknown sources” warning prompts that could alert victims to potential risks.

PWAs can closely mimic the look and feel of native apps, especially in the case of WebAPKs, where the browser logo on the icon and the browser interface within the app are hidden, so distinguishing it from legitimate applications is nearly impossible.

These web apps can get access to various device systems through browser APIs, such as geolocation, camera, and microphone, without requesting them from the mobile OS’s permissions screen.

Ultimately, PWAs can be updated or modified by the attacker without user interaction, allowing the phishing campaign to be dynamically adjusted for greater success.

Abuse of PWAs for phishing is a dangerous emerging trend that could gain new proportions as more cybercriminals realize the potential and benefits.

A few months back, we reported about new phishing kits targeting Windows accounts using PWAs. The kits were created by security researcher mr.d0x specifically to demonstrate how these apps could be used to steal credentials by creating convincing corporate login forms.

BleepingComputer has contacted both Google and Apple to ask if they plan to implement any defenses against PWAs/WebAPKs, and we will update this post with their responses once we hear back.

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
5:38 am, May 9, 2025
weather icon 7°C
L: 6° | H: 8°
overcast clouds
Humidity: 88 %
Pressure: 1020 mb
Wind: 6 mph NNE
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 100%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 5:17 am
Sunset: 8:35 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
6° | 8°°C 0 mm 0% 12 mph 88 % 1022 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
9° | 20°°C 0 mm 0% 12 mph 86 % 1021 mb 0 mm/h
Sun May 11 10:00 pm
weather icon
11° | 23°°C 0.98 mm 98% 12 mph 85 % 1015 mb 0 mm/h
Mon May 12 10:00 pm
weather icon
12° | 22°°C 1 mm 100% 12 mph 93 % 1015 mb 0 mm/h
Tue May 13 10:00 pm
weather icon
12° | 20°°C 1 mm 100% 7 mph 88 % 1022 mb 0 mm/h
Today 7:00 am
weather icon
7° | 8°°C 0 mm 0% 6 mph 88 % 1021 mb 0 mm/h
Today 10:00 am
weather icon
10° | 14°°C 0 mm 0% 8 mph 77 % 1021 mb 0 mm/h
Today 1:00 pm
weather icon
14° | 17°°C 0 mm 0% 12 mph 50 % 1021 mb 0 mm/h
Today 4:00 pm
weather icon
17° | 17°°C 0 mm 0% 12 mph 31 % 1020 mb 0 mm/h
Today 7:00 pm
weather icon
15° | 15°°C 0 mm 0% 10 mph 41 % 1020 mb 0 mm/h
Today 10:00 pm
weather icon
12° | 12°°C 0 mm 0% 8 mph 61 % 1022 mb 0 mm/h
Tomorrow 1:00 am
weather icon
10° | 10°°C 0 mm 0% 7 mph 73 % 1021 mb 0 mm/h
Tomorrow 4:00 am
weather icon
9° | 9°°C 0 mm 0% 5 mph 86 % 1021 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€91,316.98
3.19%
Ethereum(ETH)
€1,974.71
16.03%
Tether(USDT)
€0.89
-0.03%
XRP(XRP)
€2.06
5.17%
Solana(SOL)
€143.80
6.51%
USDC(USDC)
€0.89
-0.01%
Dogecoin(DOGE)
€0.172914
6.77%
Shiba Inu(SHIB)
€0.000012
6.42%
Pepe(PEPE)
€0.000010
22.10%
Scroll to Top