Skip to main content

Creating Custom UPI VPA by bypassing Protectt.AI in ICICI's banking app

Medium
Published: Sat May 24 2025 (05/24/2025, 04:04:34 UTC)
Source: Reddit NetSec

Description

Creating Custom UPI VPA by bypassing Protectt.AI in ICICI's banking app

AI-Powered Analysis

AILast updated: 06/27/2025, 09:50:22 UTC

Technical Analysis

The reported security threat involves the ability to create custom UPI Virtual Payment Addresses (VPAs) by bypassing Protectt.AI, a security mechanism integrated within ICICI Bank's mobile banking application. UPI (Unified Payments Interface) is a widely used instant real-time payment system in India, and VPAs serve as unique identifiers for users to send and receive money without sharing sensitive bank account details. Protectt.AI appears to be a fraud detection or transaction protection system designed to prevent unauthorized or malicious creation of VPAs or fraudulent transactions within the app. The bypass implies that an attacker can circumvent these security controls to generate arbitrary or malicious VPAs, potentially enabling fraudulent transactions or unauthorized fund transfers. The technical details are sparse, with the source being a Reddit NetSec post with minimal discussion and no publicly disclosed exploits or patches. The lack of affected versions and patch links suggests that the vulnerability or bypass method is either newly discovered or not yet fully analyzed or disclosed by ICICI Bank or security researchers. The medium severity rating indicates a moderate level of risk, likely due to the potential for financial fraud but possibly limited by factors such as the need for app access or partial authentication. Since the threat involves bypassing a security control in a major banking app, it could undermine trust in the app's transaction security and expose users to financial loss or fraud if exploited at scale.

Potential Impact

For European organizations, the direct impact of this threat is limited because UPI and ICICI Bank's app primarily serve the Indian market. However, European financial institutions and payment service providers should be aware of such bypass techniques as they highlight evolving attack vectors against mobile banking apps and transaction security mechanisms. European banks with similar AI-based fraud detection systems could face analogous bypass attempts, potentially leading to unauthorized transactions or fraud. Additionally, European companies with employees or customers who use ICICI Bank or UPI services (e.g., Indian diaspora or businesses with India ties) could experience indirect impacts such as fraud attempts or social engineering attacks leveraging compromised VPAs. The incident underscores the importance of robust transaction validation and anomaly detection in mobile banking apps, which is relevant to European financial institutions aiming to protect their digital payment ecosystems.

Mitigation Recommendations

Specific mitigation recommendations include: 1) ICICI Bank should conduct a thorough security review of Protectt.AI and related transaction validation logic to identify and patch the bypass vulnerability. 2) Implement multi-factor authentication (MFA) or additional verification steps specifically for VPA creation or modification to prevent unauthorized custom VPAs. 3) Enhance anomaly detection algorithms to flag unusual VPA creation patterns or transaction behaviors indicative of bypass attempts. 4) Employ runtime application self-protection (RASP) and code obfuscation to make bypassing client-side controls more difficult. 5) Conduct regular penetration testing and red team exercises focusing on AI-based fraud prevention systems. 6) For European organizations, reviewing and strengthening AI-driven fraud detection systems in their own apps, ensuring they are resilient against bypass techniques. 7) Educate users about verifying transaction details and reporting suspicious activity promptly. 8) Monitor threat intelligence sources for emerging bypass techniques targeting AI-based banking security controls.

Need more detailed analysis?Get Pro

Technical Details

Source Type
reddit
Subreddit
netsec
Reddit Score
2
Discussion Level
minimal
Content Source
reddit_link_post
Domain
rizexor.com

Threat ID: 68367d93182aa0cae23259ca

Added to database: 5/28/2025, 3:05:55 AM

Last enriched: 6/27/2025, 9:50:22 AM

Last updated: 8/1/2025, 8:38:00 AM

Views: 30

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats