The iPhone 15 Pro would finally have physical buttons, Apple
Play Store: beware of this fake Android security application, it empties bank accounts
Security researchers have discovered a new Trojan horse based on the Android mobile operating system. Through remote access, the malware in question is able to record smartphone screens and steal personal information, including bank details.
IPhone users aren’t the only victims of bank fraud, there are Android device owners as well. Indeed, Vultur is the first Android banking Trojan that can use key and screen registration to automate and intensify the collection of login credentials. Compared to other similar malware, hackers simply recorded the screen through a remote takeover.
According to security researchers at ThreatFabric, Vultur takes advantage of access permissions to capture keyboard actions and uses the VNC screen recording feature to save all phone activity, eliminating the need to register a new device. . And this technique makes it more difficult for banks to identify fraud.
Remote banking fraud: 30,000 Android devices infected with malware
The malware is installed by an infected application known as a dropper. So far, ThreatFabric researchers have found several infected apps in the Google Play Store that installed Vultur (based on a custom dropper and called Brunhilda). In total, the number of infected devices would be around 30,000 for the moment. The researchers said their estimated numbers are from malicious apps previously available on Google’s Play Store and sourced from third-party markets. States like Italy, Australia and Spain are the countries where the largest number of banking establishments have been targeted.
Even though Google has taken the initiative to remove all apps known to contain the Brunhilda dropper, security researchers at ThreatFabric believe new infected apps may appear in the future. Therefore, users of an Android device should only install apps that provide useful services and even apps from known publishers whenever possible. They should also pay close attention to user ratings and application behavior in order to spot any signs of malicious intent.
Source: ThreatFabric