

One of FluHorse’s most worrying aspects is its ability to remain undetected for extended periods of time, making it a persistent and dangerous threat that is difficult to identify. This is a 16% increase over the first quarter of 2022. In some cases, high-profile entities such as governmental officials were targeted at the initial stages of the phishing email attack.įluHorse comes as the APAC region is experiencing a major increase in cyberattacks – in the first quarter of 2023, the average organization in APAC was attacked 1,835 times per week according to Check Point Research. Basically, it requires the user to provide two different types of information to authenticate or prove they are who they say they are before access is granted.įluHorse targets multiple sectors in Eastern Asia, and is typically distributed via email. Two factor authentication (2FA) can improve security for anyone using an online service or accessing corporate resources. These malicious apps are designed to extract sensitive information, including user credentials and Two-Factor Authentication (2FA) codes. The malware operates via a set of malicious Android applications, each of which mimics a popular and legitimate app with over 100,000 installs.

It mimics legitimate apps, each of which has already been downloaded by over 100,000 users. The malware campaign is highly sophisticated and is directed at a variety of sectors in Eastern Asia.Check Point Research (CPR) uncovered a fresh strain of malware that is cleverly disguised as popular Android applications from East Asia.
