For android user, there is a threat , an updated version of the Banker Android spyware has been detected
For android user, there is a threat , an updated version of the Banker Android spyware has been detected
This spyware is stealing victim's banking details and possibly money in some cases.
This spyware is stealing victim's banking details and possibly money in some cases.
According to cybersecurity researchers from Microsoft, an unknown threat actor has initiated a smishing campaign (SMS phishing)
According to cybersecurity researchers from Microsoft, an unknown threat actor has initiated a smishing campaign (SMS phishing)
Through which it tries to trick people into downloading TrojanSpy
Through which it tries to trick people into downloading TrojanSpy
This is a malware variant that’s capable of extracting all sorts of sensitive information
Including two-factor authentication (2FA) codes, account login details, and other personally identifiable information
Including two-factor authentication (2FA) codes, account login details, and other personally identifiable information
Once the user downloads the malware, they need to grant certain permissions, such as MainActivity, AutoStartService, and RestartBroadCastReceiverAndroid
Once the user downloads the malware, they need to grant certain permissions, such as MainActivity, AutoStartService, and RestartBroadCastReceiverAndroid
The scope of the attack is also unknown, as it’s hard to determine exactly how many people are affected
The scope of the attack is also unknown, as it’s hard to determine exactly how many people are affected
Last year, Banker was observed attacking Indian consumers only, and given that the phishing SMS carries the logo of the Indian ICICI bank
Last year, Banker was observed attacking Indian consumers only, and given that the phishing SMS carries the logo of the Indian ICICI bank
The researchers said, Some of the malicious APKs also use the same Indian bank's logo as the fake app that we investigated, which could indicate that the actors are continuously generating new versions to keep the campaign going
The researchers said, Some of the malicious APKs also use the same Indian bank's logo as the fake app that we investigated, which could indicate that the actors are continuously generating new versions to keep the campaign going