Group-IB: Member of TipTop hacking group convicted

A member of TipTop, a hacking group known for attacking customers of major Russian banks for several years, was arrested and convicted in Russia. The group, dubbed TipTop by Group-IB, used malware to steal money from payment cards. Their member’s arrest was the result of a joint operation by Russian cyber police units.

The group distributed their malware by disguising it as popular mobile apps. Downloading such an app prompted the download of the actual Trojan, which gave the hackers access to the mobile banking services the victims used.

The group was dubbed TipTop and its main targets were customers of major Russian banks that used Android smartphones. The hackers delivered malware to victims’ devices via fake mobile apps disguised as banking apps, messengers, Adobe’s graphic design application, fake Google Play store app. The hackers placed links to the fake apps either on websites they designed themselves or on legitimate web resources they compromised. To increase the number of potential victims, the cybercriminals promoted these websites in search engines by purchasing ads for the keyword ‘mobile bank.

Sergey Lupanin
Sergey Lupanin

Head of Investigation Department, Group-IB

Once the user tried to download one of the malicious apps, the Hqwar Android banking Trojan (also known as Agent.BID) was installed on their device. The group tried other tools and money withdrawal schemes too, which made it difficult to attribute a particular attack to them. In 2015, the hackers used the Hqwar (Agent.BID) mobile Android Trojan to infect customers of Russian banks. In 2016, they started using the Honli Trojan, and in February 2016 an upgraded version of it, which antiviruses detected as Asacub.g. In the same year, the group tried infecting smartphones with Cron, a Trojan developed by their predecessors, which gave its name to that group. At the time, TipTop used the CatsElite (MarsElite) Trojan. In April 2017, they returned to Hqware (Agent.BID) but also used Lokibot and an upgraded version of the old Marcher (Rahunok) Trojan. All mobile Trojans used by the hackers could intercept and read SMS messages, record phone calls and send USSD requests, but their main goal was to steal payment card details either using phishing windows that copied legitimate application windows or employing web fakes designed to trick users into entering their credentials for online banking accounts. The groups’ C&Cs used to infect the devices and control botnets were located in Germany, USA and Ukraine at different times.

During the investigation, the police established that a previously convicted 31-year-old resident of the city of Krasnoyarsk, who transferred money from users’ accounts to the accounts and cards of cybercriminals, was responsible for stealing money from the residents of one of the regions in Russia (over $1,000).

The man was arrested and his home was searched. During the search, the police found and seized computers, hard drives, flash drives, phones, and SIM cards. According to the investigation, the detainee’s role in the TipTop group was to transfer money from users’ accounts to the accounts and cards of the cybercriminals.

The police opened a criminal case for an offence committed under article 273 of the Russian Criminal Code «Creation, use and dissemination of harmful computer programs». The accused was later convicted and received a two-year suspended sentence.

After the fall of the CRON gang in late 2016, TipTop, to which the detainee belonged, became one of the largest and most dangerous ones. With the use of Android Trojans, the cybercriminals have managed to infect over 800,000 smartphones. The damage from their activities is currently being established, but certain estimations suggest that the cybercriminal group could have stolen between USD 1,500 and 10,500 on a daily basis. Group-IB first detected the group’s activities in 2015. The group’s victims in a number of regions across Russia have been identified.

Sergey Lupanin
Sergey Lupanin

Head of Investigation Department, Group-IB

About Group-IB

Founded in 2003 and headquartered in Singapore, Group-IB is a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime. Combating cybercrime is in the company’s DNA, shaping its technological capabilities to defend businesses, citizens, and support law enforcement operations.

Group-IB’s Digital Crime Resistance Centers (DCRCs) are located in the Middle East, Europe, Central Asia, and Asia-Pacific to help critically analyze and promptly mitigate regional and country-specific threats. These mission-critical units help Group-IB strengthen its contribution to global cybercrime prevention and continually expand its threat-hunting capabilities.

Group-IB’s decentralized and autonomous operational structure helps it offer tailored, comprehensive support services with a high level of expertise. We map and mitigate adversaries’ tactics in each region, delivering customized cybersecurity solutions tailored to risk profiles and requirements of various industries, including retail, healthcare, gambling, financial services, manufacturing, crypto, and more.

The company’s global security leaders work in synergy with some of the industry’s most advanced technologies to offer detection and response capabilities that eliminate cyber disruptions agilely.

Group-IB’s Unified Risk Platform (URP) underpins its conviction to build a secure and trusted cyber environment by utilizing intelligence-driven technology and agile expertise that completely detects and defends against all nuances of digital crime. The platform proactively protects organizations’ critical infrastructure from sophisticated attacks while continuously analyzing potentially dangerous behavior all over their network.

The comprehensive suite includes the world’s most trusted Threat Intelligence, The most complete Fraud Protection, AI-powered Digital Risk Protection, Multi-layered protection with Managed Extended Detection and Response (XDR), All-infrastructure Business Email Protection, and External Attack Surface Management.

Furthermore, Group-IB’s full-cycle incident response and investigation capabilities have consistently elevated industry standards. This includes the 77,000+ hours of cybersecurity incident response completed by our sector-leading DFIR Laboratory, more than 1,400 successful investigations completed by the High-Tech Crime Investigations Department, and round-the-clock efforts of CERT-GIB.

Time and again, its solutions and services have been revered by leading advisory and analyst agencies such as Aite Novarica, Gartner®, Forrester, Frost & Sullivan, KuppingerCole Analysts AG, and more.

Being an active partner in global investigations, Group-IB collaborates with international law enforcement organizations such as INTERPOL, EUROPOL and AFRIPOL to create a safer cyberspace. Group-IB is also a member of the Europol European Cybercrime Centre’s (EC3) Advisory Group on Internet Security, which was created to foster closer cooperation between Europol and its leading non-law enforcement partners.