Tag: Android Malware

Finland warns of Android malware attacks breaching bank accounts
News

Finland warns of Android malware attacks breaching bank accounts

A campaign of Android malware is currently underway that aims to compromise online bank accounts, according to a warning from Finland's Transport and Communications Agency (Traficom). The organization has brought to light several instances of SMS messages that ask users to phone a number and are written in Finnish. The caller, who is a scammer, tells the victims to download the McAfee software to safeguard themselves. The communications appear to be from a local network or domestic telecom operator using spoofing technology, and they are purportedly delivered from banks or payment service providers like MobilePay. But the McAfee program contains malware that lets criminals access victims' bank accounts. The alert says that targets are urged to download a McAfee application bas...
MoqHao Android Malware Evolves with Auto-Execution Capability
News

MoqHao Android Malware Evolves with Auto-Execution Capability

MoqHao is a new strain of Android malware that threat researchers have discovered. It runs on compromised devices automatically and doesn't require user input. This latest version of MoqHao doesn't require users to install and run the app in order to achieve its intended goal, according to a research released this week by McAfee Labs. "While the app is installed, their malicious activity starts automatically." Targets of the campaign include Android users in South Korea, Japan, India, France, and Germany. MoqHao is an Android-based mobile threat termed Wroba and XLoader (not to be confused with the same-named Windows and macOS malware). It is linked to a financially driven Chinese cluster known as Roaming Mantis read more MoqHao Android Malware Evolves with Auto Execution Capability...
New Sneaky Xamalicious Android Malware Hits Over 327,000 Devices
News

New Sneaky Xamalicious Android Malware Hits Over 327,000 Devices

A powerful new Android backdoor that can perform a variety of nefarious tasks on compromised devices has been found. The malware, which the McAfee Mobile Research Team has dubbed "Xamalicious," gets its name from the fact that it was created with the help of the open-source Xamarin mobile app framework and leverages the accessibility permissions of the operating system improperly to achieve its goals. If it meets the requirements, it can also collect metadata about the infected device and initiate communication with a command-and-control (C2) server to get a second-stage payload. The following step is "dynamically injected as an assembly DLL at runtime level to take full control of the device and potentially perform fraudulent actions such as clicking on ads read more New Sneaky ...
Google Play Protect adds real time scanning to fight Android malware
News

Google Play Protect adds real time scanning to fight Android malware

Google Play Protect now offers additional, real-time screening techniques that make it more difficult for dangerous apps to use polymorphism and avoid detection. This attempts to reduce malware infections on the platform and is a major step toward improving safety for all Android users.Google's Play Protect platform, which uses data from 125 billion daily scans, is Android's built-in protection system for doing on-device scans for unwanted apps and malware. The application is compatible with both APKs (Android packages) downloaded from outside sources and third-party app stores, as well as programs downloaded through Google Play, the official app store for Android users read more Google Play Protect adds real time scanning to fight Android malware. Stay informed with the best cyb...
Fluhorse Flutter Based Android Malware Targets Credit Cards and 2FA Codes
News

Fluhorse Flutter Based Android Malware Targets Credit Cards and 2FA Codes

Researchers in cybersecurity have revealed the inner workings of the Fluhorse malware family on Android. The malware "represents a significant shift as it incorporates the malicious components directly within the Flutter code," Fortinet FortiGuard Labs analyst Axelle Apvrille wrote in a report released last week. Early in May 2023, Check Point discovered Fluhorse. This information described its attacks on customers in East Asia through rogue apps posing as ETC and VPBank Neo, which are well-known in Taiwan and Vietnam. Phishing is the malware's primary entry point. The app's ultimate objective is to send SMS-delivered two-factor authentication (2FA) codes, credit card information, and login credentials to a remote server controlled read more Fluhorse Flutter Based Android Malware...