Offbeat

Bootnotes

Swiss cheesed off as postal service used to spread malware

QR codes arrive via an age-old delivery system


Switzerland's National Cyber Security Centre (NCSC) has issued an alert about malware being spread via the country's postal service.

Citizens have been getting cunningly crafted letters faked to look like they have been sent from the nation's Federal Office of Meteorology and Climatology. They tell recipients to scan a QR code and download a "Severe Weather Warning App" for Android, which mimics the genuine Alertswiss weather app, but is spelled "AlertSwiss" in the bogus version and has a slightly different logo than the government build.

The app, hosted on a third-party site and not the official Google Play Store, contains a variant of the Coper trojan, first discovered in July 2021. Coper specializes in keylogging, intercepting two-factor authentication SMSes and push notifications, and going after banking apps installed on a device – stealing stored credentials and other data – thus allowing it to gather up all the info needed for its operators to log into people's bank accounts and plunder them. It can also display phishing screens, it responds to instructions from command-and-control servers, and it asks for a load of permissions to get away with its skulduggery.

"It is the first time the NCSC sees malware delivery through this method," the agency told The Register. "The letters look official with the correct logo of the Federal Office for Meteorology and thus trustworthy. In addition, the fraudsters build up pressure in the letter to tempt people into rash actions."

The agency told us that there's no telling how many people got the letters because Switzerland does not have a universal reporting requirement for incidents like this. The NCSC told us it had, however, heard from over a dozen people. This low number makes sense when you think about it.

Sending this type of letter in Switzerland typically costs about $1.35 per piece, suggesting the scammers likely used it in a highly targeted manner for spear-phishing specific individuals. While email has allowed malware operators to reach millions at almost zero cost, doing it by mail changes the financial equation.

Of course, abusing QR codes is nothing new - we've been reporting on that since the early 2010s. Microsoft just the other week reported more than 15,000 messages with malicious QR codes targeting the education sector had been sent every day over the past year.

But posting them is a first for us. While it seems highly inefficient, if a high-value target falls for it, the proceeds may be worth it. After all, there's a lot of wealth in Switzerland. ®

Send us news
39 Comments

UK ICO not happy with Google's plans to allow device fingerprinting

Also, Ascension notifies 5.6M victims, Krispy Kreme bandits come forward, LockBit 4.0 released, and more

'That's not a bug, it's a feature' takes on a darker tone when malware's involved

Mummy, where do zero days come from?

Iran-linked crew used custom 'cyberweapon' in US critical infrastructure attacks

IOCONTROL targets IoT and OT devices from a ton of makers, apparently

Are your Prometheus servers and exporters secure? Probably not

Plus: Netscaler brute force barrage; BeyondTrust API key stolen; and more

First-ever UEFI bootkit for Linux in the works, experts say

Bootkitty doesn’t bite… yet

AI Jesus is ready to dispense advice from a booth in historic Swiss church

Pope, Depeche Mode, silent on digital second coming

Cybercrooks are targeting Bengal cat lovers in Australia for some reason

In case today’s news cycle wasn’t shocking enough, here’s a gem from Sophos

Don't open that 'copyright infringement' email attachment – it's an infostealer

Curiosity gives crims access to wallets and passwords

Belgian cops cuff 2 suspected cybercrooks in Redline, Meta infostealer sting

US also charges an alleged Redline dev, no mention of an arrest

Dutch cops pwn the Redline and Meta infostealers, leak 'VIP' aliases

Legal proceedings underway with more details to follow

Pixel perfect Ghostpulse malware loader hides inside PNG image files

Miscreants combine it with an equally tricky piece of social engineering

Perfctl malware strikes again as crypto-crooks target Docker Remote API servers

Attacks on unprotected servers reach 'critical level'