Close Menu
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
Facebook X (Twitter) Instagram
Trending
  • Jennifer Lopez and Ben Affleck reveal summer plans after Europe trip
  • T20 World Cup: Quiet contributions from Akshar Patel, Kuldeep Yadav and Ravindra Jadeja justify Rohit Sharma’s spin vision | Cricket News
  • The impact of a sedentary lifestyle on health
  • Bartok: The World of Lilette
  • Economists say the sharp rise in the U.S. budget deficit will put a strain on Americans’ incomes
  • Our Times: Williams memorial unveiled on July 4th | Lifestyle
  • Heatwaves in Europe are becoming more dangerous: what it means for travelers
  • Christian Science speaker to visit Chatauqua Institute Sunday | News, Sports, Jobs
Facebook X (Twitter) Instagram
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
The Daily PostingThe Daily Posting
Android

Be careful — this dangerous Android malware pretends to be a McAfee security tool

thedailyposting.comBy thedailyposting.comApril 1, 2024No Comments

[ad_1]

A new version of a known Android banking Trojan is circulating the internet, stealing sensitive data and even money from victims.

Cybersecurity researchers at NCC Group’s Fox-IT have sounded the alarm about a new upgraded version of the Vultur banking trojan. This version was first spotted in his early 2021, but has since undergone many significant changes and upgrades.

While previous versions were distributed via dropper apps smuggled into the Play Store, this new version uses a combination of smishing and exploitation of legitimate apps. Researchers say the attackers first send an SMS message to the victim, warning them about the fraudulent payment transaction and sharing a phone number the victim can call.

complete acquisition

Once the victim calls the number, the attacker tricks the victim into downloading a compromised version of the McAfee Security app. On the surface the app works as intended, but in the background she delivers the Brunhilda malware her dropper. This dropper drops her 3 payloads including 2 APK and 1 DEX file. After obtaining accessibility services, these payloads establish a connection with a command-and-control (C2) server and grant the attacker remote control of her Android device.

As a Trojan horse, Vultur is quite capable. It can record your screen, log your keystrokes, and give remote access to attackers through AlphaVNC and ngrok. Additionally, attackers can download and upload files, install apps, delete files, click, scroll, and swipe within the device, and block various apps from running. You can also display custom notifications and disable Keyguard to bypass the lock screen.

Finally, Vultur encrypts C2 communications to further evade detection.

As always, the best way to protect yourself from these threats is to use common sense and only download apps from legitimate and proven repositories.

Sign up for the TechRadar Pro newsletter to get all the top news, opinions, features, and guidance you need to succeed in your business.

via peepee computer

Learn more about TechRadar Pro

[ad_2]

Source link

thedailyposting.com
  • Website

Related Posts

Qualcomm wants to make it easier for phone makers to issue Android updates

June 28, 2024

Qualcomm wants to make Android updates easier for OEMs

June 28, 2024

What’s new in the June 2024 Google system update for Android

June 28, 2024
Leave A Reply Cancel Reply

ads
© 2025 thedailyposting. Designed by thedailyposting.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms of Service
  • Advertise with Us
  • 1711155001.38
  • xtw183871351
  • 1711198661.96
  • xtw18387e4df
  • 1711246166.83
  • xtw1838741a9
  • 1711297158.04
  • xtw183870dc6
  • 1711365188.39
  • xtw183879911
  • 1711458621.62
  • xtw183874e29
  • 1711522190.64
  • xtw18387be76
  • 1711635077.58
  • xtw183874e27
  • 1711714028.74
  • xtw1838754ad
  • 1711793634.63
  • xtw183873b1e
  • 1711873287.71
  • xtw18387a946
  • 1711952126.28
  • xtw183873d99
  • 1712132776.67
  • xtw183875fe9
  • 1712201530.51
  • xtw1838743c5
  • 1712261945.28
  • xtw1838783be
  • 1712334324.07
  • xtw183873bb0
  • 1712401644.34
  • xtw183875eec
  • 1712468158.74
  • xtw18387760f
  • 1712534919.1
  • xtw183876b5c
  • 1712590059.33
  • xtw18387aa85
  • 1712647858.45
  • xtw18387da62
  • 1712898798.94
  • xtw1838737c0
  • 1712953686.67
  • xtw1838795b7
  • 1713008581.31
  • xtw18387ae6a
  • 1713063246.27
  • xtw183879b3c
  • 1713116334.31
  • xtw183872b3a
  • 1713169981.74
  • xtw18387bf0d
  • 1713224008.61
  • xtw183873807
  • 1713277771.7
  • xtw183872845
  • 1713329335.4
  • xtw183874890
  • 1716105960.56
  • xtw183870dd9
  • 1716140543.34
  • xtw18387691b

Type above and press Enter to search. Press Esc to cancel.