An Android Banking Trojan/Malware that targets around 200 mobile applications, including those offered by Indian banks, has been detected, prompting security researchers and banks to alert consumers.
The malware is designed for stealing login credentials, hijacking SMS information, uploading contact lists and SMS information to malicious servers by displaying a fake overlay screen on top of legitimate apps to capture user inputs, said software security organization QuickHeal in a post on Saturday.
“Do not download and install mobile apps from untrusted sources offered via unknown website links on unscrupulous messages,” said Canara Bank in a note to users.
The bank recommended maintaining a strategic distance from obscure wi-fi systems to avoid rebel access to gadgets.
While the malware has been Perfectly distinguished, there is no quick say any known encounters of abuse up until this point.
Android.banker.A2f8a is being circulated through a phony Flash Player application on outsider servers. This isn’t shocking, said QuickHeal, given that Adobe Flash is a standout amongst the most generally conveyed items on the web and on account of its ubiquity, it is regularly focused by assailants.
The noxious application indicates counterfeit notices in the interest of the first application and when clients tap on the phony notices, they are coordinated to enter their login accreditations into a phony login page.
The malware has targeted banking apps of Axis Bank, HDFC, ICICI, IDBI and Union Bank among others says the blog. The trojan has also targeted a number of cryptocurrency apps like Bitcoinium, Bitcoin Wallet, BTC Safari and Bitfinex apart from many others.
A number of international banking and payment applications are also listed like Citibank Australia, ING Australia Banking, Citi Mobil UK, Singapore Digital Banking and PayPal Mobile and Amazon for Tablets.
The malware can catch messages from approaching and active messages and sidestep SMS construct two-figure confirmation light of the casualty’s financial balance. It can smother the gadget’s ringer volume to keep the client being cautioned about SMSs.
Quick Heal has warned smart mobile users that there is no official Adobe Flash Player available on the Google Play Store. Adobe had also announced that it will stop updating and distributing Flash player by the end of 2020 in all formats of the browser.
Tips to stay safe from Android Banking Trojans:
Avoid downloading apps from third-party app stores or links provided in SMSs or emails.
Always keep ‘Unknown Sources’ disabled. Enabling this option allows installation of apps from unknown sources.
Most importantly, verify app permissions before installing any app even from official stores such as Google Play.
Install a reliable mobile security app that can detect and block fake and malicious apps before they can infect your device.
Always keep your device OS and mobile security app up-to-date.
Source: Quick Heal Technologies