Cyber Security, TOOLS & TRENDS

Protect Yourself from the New Android Banking Bug

android banking

Earlier this spring, security researchers located a variant on an infamous Android banking Trojan via the Google Play Store. The malware was hiding in apps, using aliases like Funny Videos 2017. The app operates just like a garden variety video application. However, while you watch and laugh at dancing kittens the Trojan quietly targets your banking applications. The Trojan has targeted victims and their banks all over the world.

This genre of malware which targets Banking apps (on Android phones) has been afflicting havoc for some time now. What separates this recent bug from the bunch, is how it targets individual victims and avoids detection by confusing (or obfuscating) the apps code and automated malware analysis engines.

To put this in layman’s terms, this little buggy is avoiding detection from your smartphone’s defense systems, putting you in danger of giving out your banking login and password to the cyber bank thief on the other end. If you grant the app administrative rights, the banking malware takes control of everything on the infected smartphone. Google removed the app from the play store after receiving the findings of the research team. However, that does not mean that other malicious apps like this one are gone.

Malware writers are constantly looking for new, original ways to evolve malware. You can protect yourself and your Android by installing an antivirus app, such as SonicWALL, that detects and blocks malware like this, before it infects your Smartphone. It is as equally important that you keep your security/antivirus app up to date. Never download third-party applications and be extremely cautious of apps that ask for “Administrative Permissions”. Only allow permissions for the specific task that the app is intended for. Finally, never click on links that are text or sent to your emails even if it looks like you recognize the sender.

If you suspect that you may be the victim of malware intrusions, contact Alpha Group’s computer forensics investigators immediately.


You Might Also Like

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>