Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The Ultimate Guide to Node.js Development Pricing for Enterprises

      July 29, 2025

      Stack Overflow: Developers’ trust in AI outputs is worsening year over year

      July 29, 2025

      Web Components: Working With Shadow DOM

      July 28, 2025

      Google’s new Opal tool allows users to create mini AI apps with no coding required

      July 28, 2025

      5 preinstalled apps you should delete from your Samsung phone immediately

      July 30, 2025

      Ubuntu Linux lagging? Try my 10 go-to tricks to speed it up

      July 30, 2025

      How I survived a week with this $130 smartwatch instead of my Garmin and Galaxy Ultra

      July 30, 2025

      YouTube is using AI to verify your age now – and if it’s wrong, that’s on you to fix

      July 30, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Time-Controlled Data Processing with Laravel LazyCollection Methods

      July 30, 2025
      Recent

      Time-Controlled Data Processing with Laravel LazyCollection Methods

      July 30, 2025

      Create Apple Wallet Passes in Laravel

      July 30, 2025

      The Laravel Idea Plugin is Now FREE for PhpStorm Users

      July 30, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      New data shows Xbox is utterly dominating PlayStation’s storefront — accounting for 60% of the Q2 top 10 game sales spots

      July 30, 2025
      Recent

      New data shows Xbox is utterly dominating PlayStation’s storefront — accounting for 60% of the Q2 top 10 game sales spots

      July 30, 2025

      Opera throws Microsoft to Brazil’s watchdogs for promoting Edge as your default browser — “Microsoft thwarts‬‭ browser‬‭ competition‬‭‬‭ at‬‭ every‬‭ turn”

      July 30, 2025

      Activision once again draws the ire of players for new Diablo Immortal marketing that appears to have been made with generative AI

      July 30, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Cyble Uncovers RedHook Android Trojan Targeting Vietnamese Users

    Cyble Uncovers RedHook Android Trojan Targeting Vietnamese Users

    July 29, 2025

    RedHook Banking Trojan

    Cybersecurity researchers at Cyble Research and Intelligence Labs (CRIL) have uncovered a new Android banking trojan called RedHook that is actively targeting Vietnamese mobile users. The malware is distributed via carefully crafted phishing sites impersonating trusted financial and government agencies.

    Once installed, RedHook delivers a dangerous combination of phishing, keylogging, and remote access capabilities, enabling full control over infected devices, yet it remains low‑profile with limited antivirus detection. 

    Decoding the RedHook Android Banking Trojan Campaign 

    CRIL first detected RedHook via a phishing website at sbvhn[.]com, which mimics the State Bank of Vietnam. The site lures users into downloading a trojanized APK (SBV.apk) from an exposed AWS S3 bucket (hxxps://nfe‑bucketapk.s3.ap‑southeast‑1.amazonaws[.]com/SBV.apk). The bucket, which has been public since November 2024, contained screenshots, phishing templates, and malware versions. It revealed that RedHook has been active since at least November 2024, with samples appearing in the wild by January 2025. 

    RedHook Stealthy Android Trojan
    Phishing site distributing a malicious APK file (Source: Cyble)

    RedHook’s infrastructure includes domains such as mailisa[.]me, previously associated with a Vietnamese cosmetic scam. That shift indicates the threat actor has evolved from social engineering fraud to wielding an Android banking trojan embedded in phishing sites. 

    Infection Workflow and Capabilities 

    After installation, the malware prompts the user for overlay access and Android accessibility services. These elevated permissions enable RedHook to perform a range of intrusive actions: launching overlay phishing pages, capturing all keystrokes (keylogging), exfiltrating contacts and SMS, and installing or uninstalling apps. The malware abuses Android’s MediaProjection API to capture the screen and streams images via WebSocket to the attacker’s control infrastructure. 

    RedHook maintains persistent WebSocket communication with its command‑and‑control (C2) server, using the subdomain skt9.iosgaxx423.xyz, while initial HTTP requests go to api9.iosgaxx423.xyz. The malware supports 34 distinct remote commands from the server, numbered actions that let operators collect device info, SMS, screenshots, send commands, trigger overlays, and more.

    Technical Deep Dive 

    Upon launch, the malware presents a spoofed login page imitating the State Bank of Vietnam. Once credentials are entered, the trojan sends them to /auth/V2/login. In response, the server issues a JWT access token and client ID. Using these tokens, RedHook reports device specifics to /member/info/addDevice, including device ID, brand, orientation, and screen lock type, allowing the attacker to register and track each compromised device. At the time of the analysis, the number of returned user IDs had increased to 570, indicating over 500 infections. 

    RedHook’s phishing workflow unfolds in stages: 

    1. Victims are prompted to photograph and upload their citizen ID. The resulting image is transmitted to /file/upload/. 
    2. Users then provide bank name, account number, name, address, birthdate, and other personal data via templates that interestingly appear in Indonesian, not Vietnamese. 
    3. Finally, the victim is asked to enter a 4‑digit password and 6‑digit two‑step verification code. 

    Every keystroke entered is logged, tagged with app package name and foreground activity, and sent to the C2 server. 

    The RAT (Remote Access Trojan) capability is enabled via WebSocket connection over skt9. During this session, captured screen frames (converted to JPEG) are streamed live. The exposed S3 bucket contained screenshots showing the WebSocket session and Chinese‑language interface elements, implying a possible Chinese‑speaking threat actor. Chinese‑language strings also appear in the malware logs. 

    Exposed S3 bucket used by malware
    Exposed S3 bucket used by malware (Source: Cyble)

    The AWS S3 bucket exposed RedHook’s phishing templates mimicking several well‑known Vietnamese targets, including Sacombank, Central Power Corporation, the traffic police (CSGT), and government portals.

    Data exposed on open S3 bucket
    Exposed data on open S3 bucket (Source: Cyble)

    Icons and branding closely mirrored those institutions to deceive victims into trusting the phishing sites. 

    Attribution and Indicators 

    Several artifacts strongly suggest a Chinese-speaking origin: Chinese text is present throughout screenshots captured from the C2 interface, and internal code and log strings also contain Chinese language. Additionally, the staging domain mailisa[.]me has links to previous Vietnamese fraud campaigns, including one case where a victim lost over 1 billion VND after being redirected to MaiLisa salon-branded phishing content. 

    Malware receiving mailisa.me domain from the server
    Malware receiving mailisa.me domain from the server (Source: Cyble)

    Screenshots from an exposed data bucket referenced “MaiLisa Beauty Salon” and showed payments of 5.5 million VND to “DTMG TRADING CO. LTD D MAILISA,” closely resembling the earlier scam.

    Exposed S3 bucket images associated with the MaiLisa Beauty Salon theme
    Exposed S3 bucket images associated with the MaiLisa Beauty Salon theme (Source: Cyble)

    Together, these elements indicate a group likely operating from a Chinese-language background, evolving from basic scams to deploying RedHook, a sophisticated Android banking trojan, through phishing sites. 

    Conclusion 

    RedHook represents a dangerous shift in Android malware, combining phishing, remote access, and surveillance to target users, especially in Vietnam, while evading detection through spoofed sites and sideloaded APKs. Its advanced features and low VirusTotal visibility make it highly stealthy.  

    To combat threats like RedHook, users should avoid installing apps from unknown sources, be cautious of suspicious permission requests, and use behavior-based mobile security. Institutions must proactively share threat intelligence to disrupt mobile attack infrastructure. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCyble Launches Essential 8 Cybersecurity Support Package for Australian Financial Sector
    Next Article Tea App Data Breach: 72,000 Selfies and IDs of Women Leaked Online

    Related Posts

    Development

    Time-Controlled Data Processing with Laravel LazyCollection Methods

    July 30, 2025
    Development

    Create Apple Wallet Passes in Laravel

    July 30, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    WordFinder app: Harnessing generative AI on AWS for aphasia communication

    Machine Learning

    Microsoft becomes the AI brain behind Premier League’s digital future

    Operating Systems

    Xbox and PC’s best L4D alternative has a new class gameplay video for you

    News & Updates

    Bill Gates says “AI will replace humans for most things” in 20 years, including blue-and white-collar jobs — but floats short work weeks and early retirement as trade-offs

    News & Updates

    Highlights

    Development

    How to Build Your First Website in 10 Minutes (No Coding Required)

    June 22, 2025

    Building a website might seem like a daunting task, especially if you have no experience with coding. But thanks to modern website builders, you can create a stunning, fully functional website in just 10 minutes. Whether you want a personal blog, an online portfolio, or a small business site, this guide will walk you through the process step by step—no technical skills required!Step 1: Choose a Website BuilderWebsite builders are platforms that make it easy to design, customize, and publish websites without needing to write a single line of code. Here are some popular options:Wix: Best for beginners with drag-and-drop functionality.Squarespace: Great for sleek, professional designs.WordPress.com: Excellent for bloggers and content-heavy sites.Shopify: Ideal for e-commerce websites.Tip: Choose a builder that aligns with your website’s purpose. For this tutorial, we’ll use Wix for its user-friendly interface and variety of templates.Step 2: Sign Up and Pick a TemplateSign Up: Go to the website builder’s homepage and create a free account. Enter your email and a password to get started.Pick a Template: After signing up, you’ll be prompted to choose a template. Templates are pre-designed layouts that act as a foundation for your website.Browse categories like “Portfolio,” “Blog,” or “Business.”Select a design that suits your style and purpose.Example: If you’re starting a photography portfolio, look for a template with a clean design and image galleries.Step 3: Customize Your WebsiteNow comes the fun part—customizing your site to make it uniquely yours.Edit Text: Click on any text box to replace the default text with your own. Add your name, business info, or a catchy tagline.Add Images: Upload your own photos or choose from the builder’s stock image library. Drag and drop images into place.Change Colors and Fonts: Most builders allow you to customize colors and fonts to match your branding.Add Pages: Need more than a homepage? Add additional pages like “About,” “Services,” or “Contact” with just a click.Tip: Keep your design clean and straightforward. Too many elements can make your site look cluttered.Step 4: Add Essential FeaturesMake your website functional by integrating essential features:Contact Form: Allow visitors to reach you easily. Drag and drop a contact form onto your page and customize the fields.Social Media Links: Add clickable icons that link to your social profiles.SEO Settings: Optimize your site for search engines by adding keywords to your page titles and descriptions.Mobile Optimization: Check how your site looks on mobile devices and make adjustments if needed.Example: Add a “Subscribe” button to collect email addresses for your newsletter.Step 5: Preview and PublishPreview Your Site: Before publishing, use the preview option to see how your site will appear to visitors. Look for any typos, broken links, or design issues.Publish: Once you’re satisfied, hit the “Publish” button. Your site is now live and accessible to the world!Get a Custom Domain: While most website builders offer free domains (e.g., yoursite.wixsite.com), upgrading to a custom domain (e.g., yoursite.com) gives your site a professional touch.Tip: Promote your site by sharing the link on social media or through email.Step 6: Keep ImprovingBuilding your website is just the beginning. To keep it fresh and engaging:Regularly update your content.Add new pages or blog posts.Analyze visitor data using tools like Google Analytics.Upgrade to premium plans for advanced features like e-commerce or ad-free hosting.Final ThoughtsCreating a website has never been easier. With a little time and creativity, you can have your own corner of the internet up and running in just 10 minutes. Whether it’s for personal or professional use, your website is a reflection of you—so make it count!

    Richieste di Integrazione Maligne? Non con Linus Torvalds di Guardia

    June 5, 2025
    DOOM: The Dark Ages gets a brand new trailer at Wrestlemania 41

    DOOM: The Dark Ages gets a brand new trailer at Wrestlemania 41

    April 21, 2025

    CVE-2024-51979 – HP IPP HTTP Stack Buffer Overflow

    June 25, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.