Close Menu
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
Facebook X (Twitter) Instagram
Trending
  • Jennifer Lopez and Ben Affleck reveal summer plans after Europe trip
  • T20 World Cup: Quiet contributions from Akshar Patel, Kuldeep Yadav and Ravindra Jadeja justify Rohit Sharma’s spin vision | Cricket News
  • The impact of a sedentary lifestyle on health
  • Bartok: The World of Lilette
  • Economists say the sharp rise in the U.S. budget deficit will put a strain on Americans’ incomes
  • Our Times: Williams memorial unveiled on July 4th | Lifestyle
  • Heatwaves in Europe are becoming more dangerous: what it means for travelers
  • Christian Science speaker to visit Chatauqua Institute Sunday | News, Sports, Jobs
Facebook X (Twitter) Instagram
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
The Daily PostingThe Daily Posting
Android

This nasty Android banking Trojan allows hackers to take full control of your phone — how to stay safe

thedailyposting.comBy thedailyposting.comApril 2, 2024No Comments

[ad_1]

Hackers have a new tool that is one of the most advanced. Android banking trojan has been upgraded with new features that allow you to remotely control infected devices.

It was first discovered in 2021 by security firm ThreatFabric. walter It was one of the first banking Trojans that could record the screen of infected Android smartphones. Over the years since then, its creator has updated his Android malware to make it even more dangerous.

According to reports security week, new technical features have been added to Vultur, further improving the malware’s ability to evade detection. It was originally distributed using malicious app On the Google Play Store, security researchers NCC Group Recently, a brand new campaign was observed using a new distribution method to trick unsuspecting users into installing this malware. best android smartphones.

Here’s everything you need to know about the Vultur banking Trojan and tips and tricks to prevent your phone from being hijacked by hackers.

Infect the victim with a hybrid attack

A person holding a phone near a laptop representing an article on how to set up a Wi-Fi hotspot on Android

(Image credit: Shutterstock)

Rather than infecting users through a malicious app, this new attack uses a hybrid attack that begins with a text message, followed by a phone call, and then another text message.

among them report, security researchers at NCC Group say this hybrid attack begins with a text message instructing potential victims to call a number if they have not authorized a large transaction from their bank account. Explaining.This transaction did not actually occur, but the message sense of urgency It might be enough to trick the user into calling that number.

If you call to inquire about a large transaction, you will receive a second text message during the call. It contains a link to a trojanized version of his McAfee Security app, which he is forced to install on his smartphone. Although the app itself looks legitimate at first glance, it actually contains: Brynhildr Dropper This is used to download the Vultur banking Trojan.

Upgrade your life with the biggest tech news, lifestyle hacks, and hand-picked analysis delivered daily. Be the first to know about the latest gadgets and latest deals.

The malware is downloaded as three separate payloads and combined on the target Android smartphone. Once installed, the hacker behind this campaign will have complete control over the infected device.

more dangerous walter

Hacker typing quickly on keyboard

(Image credit: Shutterstock)

The Vultur banking Trojan was dangerous enough when it was first observed, but it now has even more features that hackers can use in attacks.

For example, the malware can download, upload, delete, install, and search for files on an infected Android smartphone, but it can also prevent apps from running in the first place. Similarly, you can display custom notifications in the status bar and disable the keyguard that allows you to bypass the lock screen. However, the new remote control feature is the most interesting.

Although Vultur still uses AlphaVNC and ngrok for remote access functionality as it did in 2021, hackers can send commands to infected smartphones to perform scrolling, swipe gestures, clicks, and mute/unmute the device’s audio. Now you can do things like:

Like other Android malware strains, Vultur exploits the operating system’s system. accessibility services It gives you more control over infected devices. The cybercriminals behind this banking Trojan use Google’s own Firebase Cloud Messaging (FCM) Service that sends messages from command and control (C2) The server that controls the infected phone.

Typically, a hacker must maintain continuous contact with an infected device in order to take control of it. However, FCM allows you to send commands even if you lose connectivity to the device. While AlphaVNC and ngrok still require continuous remote connectivity, this new feature provides even more flexibility and makes things easier for the hackers who introduced this malware into their attacks.

New file manager functionality gives hackers more control over infected Android smartphones by allowing them to delete existing files from the device and upload new files for use in additional attacks. Become.

How to protect yourself from Android malware

Securely log in using your mobile phone

(Image source: Google)

I usually say to stay away from Android apps with poor reviews; Sideloading apps If you want to protect yourself from malware, this campaign is a little different.

it’s more like Phishing attack Because it starts with an urgent message from an unknown sender. In such cases, you need to remain calm and not let your emotions get the better of you. Instead of responding to the message immediately or at all, the first thing you should do is check your bank account to see if this big transaction actually took place. This will make it clear that this is not the case and you can safely ignore the message.

At the same time you never want bring back the hacker If you provide us with your phone number via text or email, we will contact you by phone. Automated email security checks prevent many messages from getting through. Therefore, hackers have started trying to trick users into making phone calls. It’s much easier to convince someone to do something they don’t necessarily want to do when you’re talking on the phone.

To protect yourself from Trojanized apps like the one used in this attack, you should ensure the following: Google Play Protect will be installed and enabled on your Android smartphone. However, these days it comes pre-installed on most Android smartphones. For added protection, you should also consider using one of the following: Best Android antivirus app This is because they are updated more frequently and many of them include additional security features, such as: VPN or password manager.

As Google and other companies get better at defending against attacks like this one, hackers will continue to devise new ways to trick users into installing malware on their smartphones. For this reason, be especially careful when installing new apps, and avoid apps that require manual installation at all costs.

More about Tom’s guide

[ad_2]

Source link

thedailyposting.com
  • Website

Related Posts

Qualcomm wants to make it easier for phone makers to issue Android updates

June 28, 2024

Qualcomm wants to make Android updates easier for OEMs

June 28, 2024

What’s new in the June 2024 Google system update for Android

June 28, 2024
Leave A Reply Cancel Reply

ads
© 2025 thedailyposting. Designed by thedailyposting.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms of Service
  • Advertise with Us
  • 1711155001.38
  • xtw183871351
  • 1711198661.96
  • xtw18387e4df
  • 1711246166.83
  • xtw1838741a9
  • 1711297158.04
  • xtw183870dc6
  • 1711365188.39
  • xtw183879911
  • 1711458621.62
  • xtw183874e29
  • 1711522190.64
  • xtw18387be76
  • 1711635077.58
  • xtw183874e27
  • 1711714028.74
  • xtw1838754ad
  • 1711793634.63
  • xtw183873b1e
  • 1711873287.71
  • xtw18387a946
  • 1711952126.28
  • xtw183873d99
  • 1712132776.67
  • xtw183875fe9
  • 1712201530.51
  • xtw1838743c5
  • 1712261945.28
  • xtw1838783be
  • 1712334324.07
  • xtw183873bb0
  • 1712401644.34
  • xtw183875eec
  • 1712468158.74
  • xtw18387760f
  • 1712534919.1
  • xtw183876b5c
  • 1712590059.33
  • xtw18387aa85
  • 1712647858.45
  • xtw18387da62
  • 1712898798.94
  • xtw1838737c0
  • 1712953686.67
  • xtw1838795b7
  • 1713008581.31
  • xtw18387ae6a
  • 1713063246.27
  • xtw183879b3c
  • 1713116334.31
  • xtw183872b3a
  • 1713169981.74
  • xtw18387bf0d
  • 1713224008.61
  • xtw183873807
  • 1713277771.7
  • xtw183872845
  • 1713329335.4
  • xtw183874890
  • 1716105960.56
  • xtw183870dd9
  • 1716140543.34
  • xtw18387691b

Type above and press Enter to search. Press Esc to cancel.