Article 4VZK7 Vulnerability in fully patched Android phones under active attack by bank thieves

Vulnerability in fully patched Android phones under active attack by bank thieves

by
Dan Goodin
from Ars Technica - All content on (#4VZK7)
android-malware.jpg

Enlarge (credit: portal gda / flickr)

A vulnerability in millions of fully patched Android phones is being actively exploited by malware that's designed to drain the bank accounts of infected users, researchers said on Monday.

The vulnerability allows malicious apps to masquerade as legitimate apps that targets have already installed and come to trust, researchers from security firm Promon reported in a post. Running under the guise of trusted apps already installed, the malicious apps can then request permissions to carry out sensitive tasks, such as recording audio or video, taking photos, reading text messages or phishing login credentials. Targets who click yes to the request are then compromised.

Researchers with Lookout, a mobile security provider and a Promon partner, reported last week that they found 36 apps exploiting the spoofing vulnerability. The malicious apps included variants of the BankBot banking trojan. BankBot has been active since 2017, and apps from the malware family have been caught repeatedly infiltrating the Google Play Market.

Read 11 remaining paragraphs | Comments

index?i=za6nl8TXJLk:GrQglTgZqq4:V_sGLiPB index?i=za6nl8TXJLk:GrQglTgZqq4:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments