Facebook Twitter
Sign in
  • Home
  • Beauty
  • Lifehacks
  • Food & Recipes
  • Technology
  • Travel
Sign in
Welcome!Log into your account
Forgot your password?
Password recovery
Recover your password
Search
May 30, 2025
  • Sign in / Join
Facebook Twitter
Sign in
Welcome! Log into your account
Forgot your password? Get help
Password recovery
Recover your password
A password will be e-mailed to you.
meo.tips
  • Home
  • Beauty
    • Beauty

      The Heat is On: A Southern Belle’s Guide to Summer Skin…

      Beauty

      Does Sunscreen Really Help Prevent Aging Skin?

      Beauty

      The Ultimate Guide: Uncover the Dr.G Green Mild Up Sun+ Sunscreen…

      Beauty

      “Why Homeowners Are Opting for These 3 Alternatives Instead of Indoor…

      Beauty

      “Don’t Let Keloids Get You Down: MPS in Hiruscar Silicone Pro…

  • Lifehacks
    • How to

      The Enchanting Home of a Renowned U40 Woman: A Dreamy Abode…

      How to

      The Chef’s Secret to Delicious Stir-Fry Dishes

      How to

      The Magic of Blooming Winter-Heather for Tet: An Enchanting Guide

      How to

      The Ultimate Guide to Selecting and Displaying the Stunning ‘Huyen’ Peach…

      How to

      The Art of Arranging Lilies: A Guide to a Long-lasting and…

  • Food & Recipes
    • Food & Receipts

      “The Ultimate Guide to Perfectly Boiled Chicken: From Bland and Blah…

      Food & Receipts

      “The Secret to Perfectly Boiled Offal: A Crisp, Tender Delicacy”

      Food & Receipts

      The Power of Silent Correction: A Parenting Strategy to Shape Your…

      Food & Receipts

      3 Savvy Strategies Parents Need to Know to Protect Their Child…

      Food & Receipts

      “The Secret to Perfectly Pickled Garlic: Avoiding the Green and Maintaining…

  • Technology
    • Technology

      What’s Cooking Tonight: A Delicious and Easy Dinner Menu

      Technology

      “Is Your iPhone Getting Hot While Charging? Here’s What Apple Says…

      Technology

      “Wild-Grown Veggie Beef Stew: A Tasty Twist on a Classic Favorite”

      Technology

      Is Baby Eric the Late Husband’s Child? Widow of NSUT Quy…

      Technology

      The Most Expensive Banh Mi in Saigon: A Taste of Luxury…

  • Travel
    • Travel

      “A Heartwarming Tale of Four Couples: ‘Cha Tôi Người Ở Lại’…

      Travel

      The Ultimate Superfood: This Root Veggie is Cheaper than Potatoes, Healthier…

      Travel

      The Fall of a Dynasty: A Throne’s Demise

      Travel

      Exploring the Vibrant Lai Chau Mountain Market: A Treasure Trove of…

      Travel

      The Golden Sanctuary: Unveiling the 300-Year-Old Temple and its Treasured Gilded…

Home Featured The Dark Side of iPhone Malware: Unveiling the Threats Targeting Vietnamese Users
  • Technology

The Dark Side of iPhone Malware: Unveiling the Threats Targeting Vietnamese Users

The GoldPickaxe malware targets iPhone users in Vietnam and Thailand, stealing login credentials and bypassing biometric security measures by stealing facial data. This sophisticated threat actor has crafted a cunning campaign, demonstrating a high level of technical prowess and a deep understanding of their targets. With a stealthy approach, they aim to compromise the security and privacy of unsuspecting individuals, highlighting the evolving nature of cyber threats and the need for constant vigilance.

By
Administrator
-
3 September, 2024
0
114
Facebook
Twitter
Pinterest
WhatsApp

    According to Group-IB, this could be a sign that GoldPickaxe is targeting Vietnamese users. “Based on the specific requirement of face scanning, along with the fact that GoldFactory is operating in the region, we suspect that they may have started deploying GoldPickaxe in Vietnam,” Group-IB stated.

    In a warning about online scams issued by the Department of Information Security under the Ministry of Information and Communications in February, there was a case of a user in Hanoi being tricked into installing fake public service software. The software requested a video verification, and the next day, the user’s securities account was sold and billions of dong were transferred out.

    An iPhone being used for face scanning. Photo: Luu Quy

    The presence of GoldPickaxe at a conference on finance and banking in Ho Chi Minh City in mid-March also raised concerns among organizations. According to Troy Le, representative of BShield, a security tool developer supporting many major applications in Vietnam, this malware is dangerous because it has been successfully exploited on both iOS and Android platforms, while also collecting biometric data of users. As Thailand has implemented biometric authentication, including facial recognition, for large transactions, and Vietnam is also about to apply this method, GoldPickaxe becomes a new challenge for users and platforms in protecting accounts.

    How does GoldPickaxe infiltrate accounts?

    First, the attackers will try to get the victim to install the malicious application on their device through social engineering techniques. In the case of the Hanoi victim mentioned above, they impersonated a government agency to trick the user into installing the fake public service software. In Thailand, common scenarios involve tax refund and electricity bill payment assistance software.

    For Android devices, users only need to install the application through an apk file. Meanwhile, for iOS, attackers will exploit Apple’s application testing platform, TestFlight, or convince the victim to install a Mobile Device Management (MDM) profile, giving them full control over the device.

    Attack mechanism of GoldPickaxe. Source: Group-IB

    Once inside the device, GoldPickaxe activates certain privileges, such as SMS filtering and internet access. At the same time, the fake application will ask the user to verify their identity with personal documents and a video recording. This video is sent to the hacker’s server, becoming material for deepfakes, face swapping using AI.

    According to expert Troy Le, the malware will quietly collect personal information from the device and secretly record data on the user’s activities and inputs, creating log files. Additionally, it also collects facial data and possibly the victim’s IP address to mimic their behavior, thereby tricking services into believing it is the genuine user.

    “With this data, the attacker does not need to directly perform illegal transactions from the victim’s phone. Instead, they collect all the necessary information to access the user’s banking application from another device,” said Troy Le.

    How to stay safe from GoldPickaxe?

    The Department of Information Security has continuously issued warnings and recommendations for users to not provide personal information or install applications from unknown sources to prevent account theft. However, in reality, attack scenarios and methods are constantly changing, causing many people to fall victim despite being cautious.

    From the perspective of a security platform developer, Troy Le believes that banks and financial organizations also need to take proactive measures to protect their users.

    After implementing BShield for many financial and banking applications in Vietnam, Troy Le pointed out that some platforms and services still have weaknesses, such as lacking a mechanism to detect unsafe devices and take timely preventive actions, and lacking continuous monitoring during the application’s operation. This allows hackers to take control of the victim’s account once they pass the initial verification stage. Additionally, some applications may have API vulnerabilities, allowing malware to interfere and modify the application’s behavior, enabling man-in-the-middle attacks.

    “Financial and banking applications are always the primary targets of hackers. Therefore, they need to establish mechanisms to protect both their users and their services,” the expert recommended.

    According to Group-IB, the malware from the GoldFactory group also has many features that can trick users, such as fake application alerts, fake call screens, and deceptive messages prompting the victim to perform certain actions. Users should be cautious if they notice any unusual behavior, such as rapid battery drain, unusual device heat, strange notifications, high data usage, or applications requesting excessive permissions.

    Frequently asked questions

    iPhone malware refers to malicious software specifically designed to target Apple’s iOS operating system. While iPhones are generally considered more secure than Android devices, they are still vulnerable to malware attacks. The article reveals a rise in iPhone malware targeting Vietnamese users, with threats including data theft, unauthorized access, and financial loss.

    The malware campaign uncovered in the article specifically targets Vietnamese iPhone users through a combination of social engineering and exploit techniques. Malicious apps masquerading as legitimate Vietnamese applications are used to trick users into installing them. Once installed, these apps can gain unauthorized access to sensitive data, including contacts, messages, and even banking information.

    There are several indicators that your iPhone may be infected with malware. Unexplained data usage or battery drain, unexpected crashes or behavior, and the presence of unfamiliar apps or settings can all be signs of a malware infection. It’s important to remain vigilant and keep your device updated with the latest security patches to lower the risk of infection.

    To protect your iPhone from malware, it’s crucial to follow basic cybersecurity practices. Only download apps from trusted sources, such as the App Store, and be cautious of links or attachments in messages. Keep your iOS version and apps up to date, as updates often include security patches. Additionally, consider using a reputable mobile security solution to add an extra layer of protection to your device.

    If you suspect that your iPhone has been infected with malware, it’s important to act quickly. Disconnect your device from the internet and put it into airplane mode to prevent further damage or data exfiltration. Perform a factory reset to erase all content and settings, which should remove the malware. After resetting your device, change all important passwords, especially for banking and email accounts, as a precautionary measure.
    SOURCEeva
    • TAGS
    • account infiltration
    • biometric data
    • GoldPickaxe
    • online scams
    • security measures
    Facebook
    Twitter
    Pinterest
    WhatsApp
      Previous articleThe 3 Types of Clothes Dryers: A Guide to Help You Choose the Perfect One for Your Needs
      Next articleThe Ultimate Emoji Creator: Unveiling Google’s Emoji Kitchen
      Administrator
      Administrator

      RELATED ARTICLESMORE FROM AUTHOR

      Health & Life

      3 Drinks That May Increase Your Risk of Alzheimer’s Disease

      Health & Life

      “Beware: 5 Seemingly Safe Foods That Could Cause Food Poisoning If Mishandled”

      Health & Life

      8 Warning Signs of Stomach Problems: Don’t Ignore, Get Checked Now!

      Most popular

      “The Ultimate Guide to Making Bitter Gourd Soap for Effective Back...

      17 July, 2024

      The Power of Perseverance: From Poverty to Prosperity

      7 December, 2023

      Unexpected Benefits of Mixing White Vinegar with Eucalyptus Oil – Essential...

      8 December, 2023
      - Advertisement -

      Recent posts

      3 Drinks That May Increase Your Risk of Alzheimer’s Disease

      Administrator - 29 May, 2025 0

      “Beware: 5 Seemingly Safe Foods That Could Cause Food Poisoning If Mishandled”

      Administrator - 29 May, 2025 0

      8 Warning Signs of Stomach Problems: Don’t Ignore, Get Checked Now!

      Administrator - 29 May, 2025 0

      “The Dark Side of Oil: Experts Uncover 4 Ways to Take Control of Your...

      Administrator - 29 May, 2025 0

      Breakfast: Skip the Rice or Instant Noodles! 5 Quick, Easy, and Nutritious Alternatives.

      Administrator - 29 May, 2025 0

      Most popular

      Revitalize Your Skin with Lemon: Beauty Tips to Achieve a Brighter...

      19 January, 2024

      “Relieve Eye Strain from Extended Computer Use with These 5 Simple...

      18 July, 2024

      “The Great Laundry Weight Debate: 7kg or 12kg for Dry or...

      6 November, 2024
      - Advertisement -

      Recent posts

      3 Drinks That May Increase Your Risk of Alzheimer’s Disease

      Administrator - 29 May, 2025 0

      “Beware: 5 Seemingly Safe Foods That Could Cause Food Poisoning If Mishandled”

      Administrator - 29 May, 2025 0

      8 Warning Signs of Stomach Problems: Don’t Ignore, Get Checked Now!

      Administrator - 29 May, 2025 0

      “The Dark Side of Oil: Experts Uncover 4 Ways to Take Control of Your...

      Administrator - 29 May, 2025 0

      Breakfast: Skip the Rice or Instant Noodles! 5 Quick, Easy, and Nutritious Alternatives.

      Administrator - 29 May, 2025 0
      - Advertisement -
      ABOUT ME
      Vietnamese tips & tricks
      Contact me: [email protected]
      FOLLOW US
      Facebook Twitter
      © Copyright 2022 - Meo.Tips