Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems

February 21, 2026

ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories

February 21, 2026

Why 84% of Security Programs Are Falling Behind

February 21, 2026
Facebook X (Twitter) Instagram
Saturday, February 21
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Industrial-Scale Fake Coretax Apps Drive $2m Fraud in Indonesia
Cyber Security

Industrial-Scale Fake Coretax Apps Drive $2m Fraud in Indonesia

Team-CWDBy Team-CWDFebruary 19, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A sophisticated fraud campaign exploiting Indonesia’s official Coretax tax platform has led to an estimated nationwide financial impact of $1.5m to $2m.

According to findings released by Group-IB, the operation began in July 2025 and intensified in January 2026 during the national tax filing period. It impersonated the Coretax web service to trick users into installing malicious mobile applications.

The security experts explained how Coretax, accessible only through its official website and not via a mobile app, became the lure for a coordinated attack chain combining phishing websites, WhatsApp impersonation of tax officers and voice phishing (vishing) calls. 

Victims were directed to download fraudulent APK files, which enabled remote access to their devices and unauthorized banking transactions.

Investigators linked the campaign to the GoldFactory threat cluster, which deployed multiple malware families, including Gigabud.RAT and MMRat.

Group-IB identified 228 new malware samples during the investigation. The infrastructure behind the scheme was also used to impersonate more than 16 trusted brands spanning government services, airlines, pension funds and energy providers.

Read more on mobile banking trojans: New Android RAT Klopatra Targets Financial Data

According to the report, the fraudsters targeted a potential pool of 67 million Indonesian taxpayers. Among financial institutions protected by Group-IB, the fraud success rate was limited to 0.027% of malware-compromised devices due to predictive detection systems.

The broader financial impact was calculated using a device compromise rate of 0.025%, equivalent to roughly 2.5 in 1000 banking users. When applied across Indonesia’s population of 287 million exposed to the abused brands, losses and associated operational costs were estimated between $1.5m and $2m.

The researchers also uncovered 996 phishing URLs generated through a centralized framework, suggesting a malware-as-a-service (MaaS) model capable of expanding into other countries, including Thailand, Vietnam, the Philippines and South Africa.

Detection and Predictive Defence

The campaign relied on a multi-stage process:

  • Phishing links distributed via fake WhatsApp tax officials

  • Installation of malicious apps that freeze devices and harvest data

  • Voice calls pressuring victims to transfer alleged tax payments

  • Screen recording to capture banking credentials and OTP codes

  • Remote account takeover (ATO) and fund transfers through mule networks

Group-IB said layered detection combining signature analysis, behavioral monitoring and contextual intelligence reduced losses among its clients.

By mapping infrastructure patterns and forecasting brand impersonation trends, the firm reported preventing most fraudulent transactions before funds were withdrawn.

The findings highlight how coordinated malware operations can erode trust in digital public services, particularly when they exploit critical platforms such as national tax systems.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleIs Poshmark safe? How to buy and sell without getting scammed
Next Article APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities
Team-CWD
  • Website

Related Posts

Cyber Security

National Gas CTO Darren Curley on IT/OT Security Integration

February 20, 2026
Cyber Security

Why Your Organization Should Start Quantum Preparedness Today

February 19, 2026
Cyber Security

Why Ransomware Remains One of Cybersecurity’s Most Persistent Threats

February 18, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Drowning in spam or scam emails lately? Here’s why

January 27, 2026

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

January 16, 2026

Common Apple Pay scams, and how to stay safe

January 22, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.