As it stated in Malicious Android apps have been Revealed in the Google Play store that going to only trigger the time a phone moves, researchers say. The malicious apps deploy a banking Trojan called Anubis, but it is how the payload deploys that is of real interest. If sensors do geneaverage motion data then the malicious apps going to spring and attempt to conned the consumer into downloading and installing the Anubis Trojan by method of an APK and fake system update message. The code is "strikingly similar" to known Anubis samples and connects to a command-and-control (C2) server hosted on domains alextremely linked to the banking Trojan. A malicious app called "Google Protect," alongside fake shopping and stock market apps masked the Anubis malware deployed for the same goal -- to robber banking credentials.
These malicious Android apps will only strike when you move your smartphone
collected by :Maya Tony
As it stated in Malicious Android apps have been Revealed in the Google Play store that going to only trigger the time a phone moves, researchers say. The malicious apps deploy a banking Trojan called Anubis, but it is how the payload deploys that is of real interest. If sensors do geneaverage motion data then the malicious apps going to spring and attempt to conned the consumer into downloading and installing the Anubis Trojan by method of an APK and fake system update message. The code is "strikingly similar" to known Anubis samples and connects to a command-and-control (C2) server hosted on domains alextremely linked to the banking Trojan. A malicious app called "Google Protect," alongside fake shopping and stock market apps masked the Anubis malware deployed for the same goal -- to robber banking credentials.
As it stated in Malicious Android apps have been Revealed in the Google Play store that going to only trigger the time a phone moves, researchers say. The malicious apps deploy a banking Trojan called Anubis, but it is how the payload deploys that is of real interest. If sensors do geneaverage motion data then the malicious apps going to spring and attempt to conned the consumer into downloading and installing the Anubis Trojan by method of an APK and fake system update message. The code is "strikingly similar" to known Anubis samples and connects to a command-and-control (C2) server hosted on domains alextremely linked to the banking Trojan. A malicious app called "Google Protect," alongside fake shopping and stock market apps masked the Anubis malware deployed for the same goal -- to robber banking credentials.
Post a Comment