Threat actors started to use progressive web applications to impersonate banking apps and steal credentials from Android and iOS users - Using this type of apps in phishing campaigns allows evading detection, bypass app installation restrictions
Cybersecurity company ESET reports that it is currently tracking two distinct campaigns relying on this technique
the two campaigns appear to be operated by different threat actors. One uses a distinct command and control (C2) infrastructure to receive stolen credentials, while the other group logs stolen data via Telegram.