{"id":12517,"date":"2016-07-05T13:00:18","date_gmt":"2016-07-05T17:00:18","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/?p=12517"},"modified":"2019-11-15T22:51:40","modified_gmt":"2019-11-15T11:51:40","slug":"airdroid-scam","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/airdroid-scam\/12517\/","title":{"rendered":"How cybercriminals defraud freelancers"},"content":{"rendered":"<p>When it comes to theft, cybercriminals usually use malware: ransomware, banking Trojans, viruses, and other such means. But sometimes, a good story and some perfectly legal software may be enough for them to accomplish their goals. For example, some crooks have been using AirDroid \u2014 a powerful app for remote smartphone management \u2014 to steal money from freelancers.<\/p>\n<p>The scheme is simple. Criminals start by finding a potential victim on a website where employers look for freelancers and freelancers look for work. A crook claims to be an employer in search of a specialist for a simple project. Usually, they advertise for testers, designers, or copywriters, but the approach can be used to fool other types of freelancers as well.<\/p>\n<p>Once they\u2019re in contact, the criminal asks the freelancer to install an app needed for the job \u2014 to write a review, draw an icon, or test new features, for example. The majority of cases we are aware of involved <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.sand.airdroid\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">AirDroid<\/a>, a legitimate app for remote management of mobile devices. <\/p>\n<p>The link leads to the official Google Play store \u2014 and so even a suspicious freelancer would not see signs of phishing or any other kind of cheating. Once the app is installed, the criminal sends login and password credentials for a test account. It\u2019s not uncommon for clients to share data with freelancers, so everything still looks OK. The victim logs in with the provided credentials, and boom, the criminal has full control over the freelancer\u2019s device.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">7 bad tricks used to trick people online <a href=\"https:\/\/t.co\/s0VOvwkQju\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/s0VOvwkQju<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/scams?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#scams<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/onlineshopping?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#onlineshopping<\/a> <a href=\"https:\/\/t.co\/T0OgdkFZoD\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/T0OgdkFZoD<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/699612526783365121?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 16, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script> <\/p>\n<p>If that compromised device has a mobile banking app, criminals can transfer money out. They can lock the phone and demand ransom for restoring it to working order. They can also dig into personal messages and photos \u2014 perhaps finding something worthy of blackmail. All in all, that smartphone is a goldmine for the criminal.<\/p>\n<p>There is even a detailed manual (for ethical reasons, we won\u2019t link to it) that explains how to defraud people with the help of AirDroid. And yet, the app is guilty of nothing at all \u2014 it\u2019s a legal, fully functional, and easy to use program that gives users remote access to their own devices. Unfortunately, it\u2019s so useful that it\u2019s always on criminals\u2019 radar.<\/p>\n<p>The company published a warning on the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.sand.airdroid&amp;hl=ru\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">app\u2019s Russian page on Google Play<\/a> (for this type of scam, criminals hunt for freelancers mainly on Russian sites, but it can easily be implemented anywhere in the world) that warns people not to use any accounts but their own, to minimize the risk of sharing their personal data with account owners. Developers know about this fraudulent activity, and they are trying to solve the problem. Unfortunately, people are rarely careful about what they\u2019re installing \u2014 and who reads an app\u2019s full description?<\/p>\n<blockquote class=\"twitter-pullquote\"><p>How cybercriminals defraud #freelancers<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FvzS8&amp;text=How+cybercriminals+defraud+%23freelancers\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>When you seem to be giving up your information deliberately, no antivirus can protect you. Security solutions were designed to fight viruses and Trojans, but AirDroid is a legitimate app created to perform tasks that are perfectly legal. It has high Google Play rating, and for good reason. The problem is that criminals also like the app. In such cases, the only way to protect yourself is to understand how they work.<\/p>\n<p>Of course, AirDroid is not the only remote-access app, and therefore it is not unique in being used by scammers. <a href=\"https:\/\/discussions.apple.com\/thread\/6447067?tstart=0\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Criminals often make use of remote access software<\/a> such as Teamviewer and other similar solutions. You need to be very cautious every time you install an app or program on your laptop or mobile phone, even if it\u2019s at the request of a client \u2014 and especially if the request comes from an unsolicited \u201c<a href=\"http:\/\/www.pcadvisor.co.uk\/forum\/helproom-1\/teamviewer-scam-fix-4037977\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Microsoft representative<\/a>\u201d or some \u201ctechnical support service.\u201d<\/p>\n<p>Social engineering subverts security software, which is why we often write about such schemes on Kaspersky Daily. You need to know <a href=\"https:\/\/www.kaspersky.com.au\/blog\/ominous-targeted-hacks\/11771\/\" target=\"_blank\" rel=\"noopener noreferrer\">how criminals defraud people<\/a> and <a href=\"https:\/\/www.kaspersky.com.au\/blog\/12-security-rules-for-2016\/10966\/\" target=\"_blank\" rel=\"noopener noreferrer\">how to stay safe<\/a>. You can follow our news on <a href=\"https:\/\/twitter.com\/Kaspersky\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Twitter<\/a> and <a href=\"https:\/\/www.facebook.com\/KasperskyLabAmericas\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Facebook<\/a>. Keep up \u2014 alert today is alive tomorrow.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Criminals are stealing money from freelancers \u2014 by offering them a job.<\/p>\n","protected":false},"author":522,"featured_media":12518,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,9],"tags":[1693,105,80,1694,1695,97],"class_list":{"0":"post-12517","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-tips","9":"tag-airdroid","10":"tag-android","11":"tag-fraud","12":"tag-freelance","13":"tag-remote-access","14":"tag-security-2"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/airdroid-scam\/12517\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/airdroid-scam\/7371\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/airdroid-scam\/7392\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/airdroid-scam\/7338\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/airdroid-scam\/8595\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/airdroid-scam\/8545\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/airdroid-scam\/12404\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/airdroid-scam\/12517\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/airdroid-scam\/6391\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/airdroid-scam\/8115\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/airdroid-scam\/11913\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/airdroid-scam\/12404\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/airdroid-scam\/12517\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/airdroid\/","name":"AirDroid"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/12517","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/522"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=12517"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/12517\/revisions"}],"predecessor-version":[{"id":24508,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/12517\/revisions\/24508"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/12518"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=12517"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=12517"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=12517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}