CyberSpecta Logo
MalwareBy CyberSpecta

Neo_Net: The Mastermind Behind a Global eCrime Campaign Targeting Banks

Share

For almost two years, from June 2021 to April 2023, a widespread eCrime campaign targeted clients of prominent banks worldwide. The mastermind behind this operation, known as Neo_Net, focused primarily on Spanish and Chilean banks, successfully compromising the security of several financial institutions. Security researcher Pol Thill’s finding published by SentinelOne sheds light on the operations of Neo_Net and his Smishing-as-a-Service platform called Ankarex.

The Campaign:

Neo_Net employed a sophisticated multi-stage attack strategy, starting with SMS phishing messages sent across Spain using his proprietary service called Ankarex. These messages imitated reputable financial institutions, tricking victims into clicking on malicious links. The phishing pages used by Neo_Net were carefully designed to resemble genuine banking applications, employing defense measures to evade detection. Once victims submitted their credentials, the information was surreptitiously exfiltrated to a Telegram chat, granting the threat actors unrestricted access to stolen data.

Countries targeted by Neo_Net
Countries targeted by Neo_Net (Image: SentinelOne)

Circumventing Multi-Factor Authentication (MFA):

Neo_Net coerced victims into installing a purported security application on their Android devices to bypass MFA mechanisms commonly used by banking applications. These applications, which were trojans disguised as security tools, gained permission to view and send SMS messages. The threat actors could circumvent MFA by covertly exfiltrating incoming SMS messages, including One-Time Passwords (OTPs). Direct phone calls to victims were also used to deceive them into installing Android spyware or disclosing OTPs.

The Success and Impact:

Despite using relatively unsophisticated tools, Neo_Net, and its affiliates stole over 350,000 EUR from victims’ bank accounts and compromised a significant amount of personally identifiable information (PII). Their success can be attributed to the highly targeted nature of their operations, focusing on specific banks and meticulously copying their communications to impersonate bank agents. The simplicity of SMS spyware made detecting it challenging, as it only required permission to send and view SMS messages.

Neo_Net’s Background and Ankarex:

Neo_Net, the Mexico-based hacker behind the global cybercrime campaign, has been active since early 2021. He founded Ankarex, a Smishing-as-a-Service platform that enables infrastructure rental to multiple affiliates. Through Ankarex, Neo_Net offered leads and advertised his Android SMS spyware service. He collaborated with individuals from a Spanish-language IT forum and was traced back to several unique IP addresses in Mexico.

Conclusion:

Neo_Net’s eCrime campaign targeting banks showcased the significant damage even unsophisticated cybercriminals can cause. The campaign’s success was attributed to highly targeted operations, impersonating bank agents, and exploiting the vulnerability of SMS-based multi-factor authentication. This highlights the need for more robust safeguards like physical tokens or external applications to enhance security. The impact of Neo_Net’s operation underscores the importance of continuous vigilance and strong cybersecurity measures for financial institutions and individuals alike.

Related News

Starkcat and HotPage Malware Target Critical Infrastructure and Browser Traffic

Starkcat and HotPage Malware Target Critical Infrastructure and Browser Traffic

The cybersecurity landscape is ever-evolving, with new threats emerging regularly. Two recent discoveries, the Starkcat and HotPage malware, have drawn significant attention due to their sophisticated methodologies and potential impacts. Origin and Discovery Starkcat, identified by cybersecurity researchers at ESET as a significant new threat, originated from an unknown but highly capable group. This malware [...]

ObjCShellz: BlueNoroff's Latest macOS Weapon

ObjCShellz: BlueNoroff's Latest macOS Weapon

In the ever-evolving landscape of cyber threats, the North Korea-linked nation-state group BlueNoroff has once again made headlines. Jamf Threat Labs recently uncovered a previously undocumented macOS malware strain dubbed ObjCShellz. This malware is attributed to BlueNoroff and is a critical component of the ongoing RustBucket malware campaign, which has been under scrutiny since earlier [...]

StripedFly: Malware That Evaded Detection for Over Five Years

StripedFly: Malware That Evaded Detection for Over Five Years

In the vast landscape of cybersecurity threats, the discovery of StripedFly malware has sent shockwaves through the industry. Initially dismissed as just another cryptocurrency miner, this malware has proven to be a sophisticated and multi-faceted threat, employing an intricate modular framework that operates seamlessly on both Linux and Windows platforms. Behind its cryptocurrency mining facade [...]