By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
10alert.com10alert.com10alert.com
  • Threats
    • WordPress ThreatsDanger
    Threats
    A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include…
    Show More
    Top News
    8 fun facts about fax. Yes, fax!
    11 months ago
    International World Backup Day, 31 March
    12 months ago
    Antivirus: Microsoft Security Essentials 4 ready for download
    11 months ago
    Latest News
    Two privilege escalation vulnerability in Simple Membership Plugin
    11 hours ago
    Wordfence Intelligence Weekly WordPress Vulnerability Report (September 11, 2023 to September 17, 2023)
    7 days ago
    Exploring Winrar Vulnerability (CVE-2023-38831) | McAfee Blog
    1 week ago
    Two PHP Object Injection Vulnerabilities Fixed in Essential Blocks
    1 week ago
  • Fix
    Fix
    Troubleshooting guide you need when errors, bugs or technical glitches might ruin your digital experience.
    Show More
    Top News
    How to enable DNS over HTTPS in Chrome
    12 months ago
    How to check Windows Update history on Windows 10
    12 months ago
    Windows 10 update KB5011543 (build 19044.1620) brings search highlights
    12 months ago
    Latest News
    How automatically delete unused files from my Downloads folder?
    7 months ago
    Now you can speed up any video in your browser
    7 months ago
    How to restore access to a file after EFS or view it on another computer?
    8 months ago
    18 Proven Tips to Speed Up Your WordPress Site and Improve SEO | 2023 Guide
    8 months ago
  • How To
    How ToShow More
    How to get the latest Windows 11 innovations
    14 hours ago
    Dynamic Lighting is now available on Windows 11
    14 hours ago
    Writing poems using LLama 2 on Workers AI
    Writing poems using LLama 2 on Workers AI
    14 hours ago
    serverless GPU-powered inference on Cloudflare’s global network
    serverless GPU-powered inference on Cloudflare’s global network
    14 hours ago
    You can now use WebGPU in Cloudflare Workers
    You can now use WebGPU in Cloudflare Workers
    14 hours ago
  • News
    News
    This category of resources includes the latest technology news and updates, covering a wide range of topics and innovations in the tech industry. From new…
    Show More
    Top News
    Opening a Chrome window with a given window width and height
    11 months ago
    How do scammers find out card numbers and balances in Sberbank?
    11 months ago
    How to remove the background of an image?
    11 months ago
    Latest News
    How to install September 2023 update with 23H2 features for Windows 11
    19 hours ago
    How to uninstall September update (KB5030310) from Windows 11
    19 hours ago
    How to remove the quiet mode icon in the corner of the iPhone 15 screen ProiPhone 15 Pro and iPhone
    2 days ago
    Sberbank has figured out how to effectively catch scammers – it will listen to everything you
    2 days ago
  • Glossary
  • My Bookmarks
Reading: An Android that robbed your bank account -Kaspersky Daily
Share
Notification Show More
Aa
Aa
10alert.com10alert.com
  • Threats
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
  • Threats
    • WordPress ThreatsDanger
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
Follow US
ThreatsWordpress Threats

An Android that robbed your bank account -Kaspersky Daily

Vitus White
Last updated: 13 October
Vitus White 12 months ago
Share
4 Min Read

It was predicted, it was feared, and the day has come. An Android Trojan that has the ability to steal money from bank accounts has emerged in Russia.

robber_title_EN

We have discussed all of the dangers posed by potential smartphone malware. Your smartphone contains private and financial data, valuable to cybercriminals. Nevertheless, most “commercially-oriented” Android malware steals from users by sending text messages to premium-rate numbers. Although unpleasant, this kind of theft rarely inflicts major damage, because most accounts associated with cell phones rarely contain a significant amount of money. Moreover, responsible network operators often refund users affected by this type of theft. So it’s no surprise that thieves have now invented more effective tools.

An Android Trojan that was designed to execute remote commands issued by a hacker is able to rob you using SMS banking.

Kaspersky Lab analysts recently discovered an Android Trojan that was designed to execute remote commands issued by a hacker. It doesn’t send premium SMS automatically, but it is able to steal all incoming and outgoing texts, call logs, phone IMEI, network IDs and other data. A thief remotely commands the infected smartphone to send arbitrary SMS as well as setup incoming calls and/or message filters affecting specific phone numbers. This toolset is used to check if a phone is attached to a mobile banking service, and after this, hackers try to transfer their victim’s money.

The test, conducted in Russia, has shown, that hackers try to check if an infected phone is registered in a popular bank in Russia. The registered phone owner is able to withdraw a balance with the phone number in Russia. The daily amount of such a transfer is limited to $100 and requires additional confirmation, but hackers have all the instruments to confirm transfer as well as prevent the legitimate owner from noticing any suspicious messages.  With any luck for thieves, a Trojan could survive on a victim’s phone for many days, effectively emptying his or her bank account.

Russian hackers are well known in the cybercriminal world for establishing innovative theft schemes and software. After some initial testing in Russia, this Trojan might be resold to criminals in other regions to pull off the same scheme, as it is effective for any country and bank relying only on SMS for issuing payment instructions. To spread the Trojan, hackers could infect legitimate websites and redirect mobile users to malicious sites offering a “Flash player update.”

To avoid infection, follow the Android user golden rules:

  • Switch off “Allow installation from unknown sources” in security settings
  • Use Google Play, do not use untrusted third-party app stores
  • Before installing a new app, check every permission requested by this app and consider if those permissions are reasonable for that type of app
  • Check app ratings and downloads count, avoid applications with low ratings and a small number of downloads
  • Use full-scale security protection for your Android

Source: kaspersky.com

Translate this article

TAGGED: Malware, Security, Software, Threats
Vitus White October 13, 2022 October 7, 2022
Share This Article
Facebook Twitter Reddit Telegram Email Copy Link Print

STAY CONECTED

24.8k Followers Like
253.9k Followers Follow
33.7k Subscribers Subscribe
124.8k Members Follow

LAST 10 ALERT

Two privilege escalation vulnerability in Simple Membership Plugin
Two privilege escalation vulnerability in Simple Membership Plugin
Wordpress Threats 14 hours ago
How to get the latest Windows 11 innovations
Windows 14 hours ago
Dynamic Lighting is now available on Windows 11
Windows 14 hours ago
Writing poems using LLama 2 on Workers AI
Writing poems using LLama 2 on Workers AI
Apps 14 hours ago
serverless GPU-powered inference on Cloudflare’s global network
serverless GPU-powered inference on Cloudflare’s global network
Apps 14 hours ago

You Might Also Like

Two privilege escalation vulnerability in Simple Membership Plugin
Wordpress Threats

Two privilege escalation vulnerability in Simple Membership Plugin

14 hours ago
Windows

How to get the latest Windows 11 innovations

14 hours ago
Writing poems using LLama 2 on Workers AI
Apps

Writing poems using LLama 2 on Workers AI

14 hours ago
serverless GPU-powered inference on Cloudflare’s global network
Apps

serverless GPU-powered inference on Cloudflare’s global network

14 hours ago
Show More

Related stories

How to upgrade to Windows 11 23H2 with Installation Assistant
Critical Vulnerability in Forminator Plugin
How to blur image background in Photos for Windows 11
How to download official Windows 11 23H2 ISO file
PHP Object Injection Vulnerability in Flatsome Theme
How to download Windows 11 22H2 ISO after 23H2 releases
Previous Next

10 New Stories

You can now use WebGPU in Cloudflare Workers
How to install September 2023 update with 23H2 features for Windows 11
How to uninstall September update (KB5030310) from Windows 11
Traffic anomalies and notifications with Cloudflare Radar
Sippy helps you avoid egress fees while incrementally migrating data from S3 to R2
the modern way to connect and protect your clouds, networks, applications and users
Previous Next
Hot News
Two privilege escalation vulnerability in Simple Membership Plugin
How to get the latest Windows 11 innovations
Dynamic Lighting is now available on Windows 11
Writing poems using LLama 2 on Workers AI
serverless GPU-powered inference on Cloudflare’s global network
10alert.com10alert.com
Follow US
© 10 Alert Network. All Rights Reserved.
  • Privacy Policy
  • Contact
  • Customize Interests
  • My Bookmarks
  • Glossary
Go to mobile version
adbanner
AdBlock Detected
Our site is an advertising supported site. Please whitelist to support our site.
Okay, I'll Whitelist
Welcome Back!

Sign in to your account

Lost your password?