• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 24th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Technology News
Android

New Android Malware Asks for Selfies; Steals Credit Card Details

October 17th, 2016 Waqas Android, Malware, Security 0 comments
New Android Malware Asks for Selfies; Steals Credit Card Details
Share on FacebookShare on Twitter
Your Selfie can Land You In Great Trouble — Researchers Discover New Malware that Asks for User’s Selfie to Carry Out Identity Theft.

Researchers at McAfee Labs’ Mobile Research department have discovered a very powerful Android trojan that exploits the selfie mania that has taken the world by storm.

Taking advantage of the victim’s innocence and using advanced security verification methods, the malware lures the individual into taking a selfie by masquerading as a fake app. During the process, the malware executes a code in the background that asks users for payment and personal information for “verification purposes.”

[q]Never download apps or plugins from a 3rd-party site[/q]

Initially, the malware asks for credit card information and after verifying, it asks for more information including the card’s 4-digit number printed on its back. It then asks for personal details like age, birthday and mailing address. After this step, the malware asks for a picture of the user holding ID card. The picture is required with both the front and back sides of the ID card. Once all the correct information is obtained, the cyber-crooks access the user’s online accounts.

android-malware-selfies-steals-credit-cards

Also Read: MasterCard Plans to Use Selfies to Authenticate Online Transactions

In a blog post published on 13th October, McAfee researchers revealed that the trojan is masked as an Android video plugin so it can obtain access to the various device permissions that are required for the execution of the malicious code.

android-malware-selfies-steals-credit-card-blog

 

The activities of this malware are currently restricted to users in Hong Kong and Singapore, however, it’s only a matter of time before the cybercriminals will start targeting users around the world. Remember, this malware lures the user into installing it on the mobile by using the disguise of a video codec or plugin from third-party websites.

android-malware-selfies-steals-credit-card-new

You can stay protected from such dangerous threats by refraining from installing unauthentic or mysterious plugins. Whenever a website asks for installation of a video plugin or codec, never do that because usually, these are methods used by cyber-criminals for installing malware on your device. Even if you do need an authentic app, download it from official Google Play Store. Usually, mobile phones come with all the necessary codecs and hence, you may never need to install any new ones. If an app asks you to do so, immediately uninstall it.

Also Read: Having Nude Selfies on Phone May Send You to Prison in the U.S.

[fullsquaread][/fullsquaread]

Also Read: Selfie Psycho: Paramedic Fired for Taking Pictures with Dying Patients (Pics) 

Furthermore, never ever take a picture of yourself holding your ID card and don’t enter payment information or credit card number ever. Not to forget to install some reliable security software and keep it updated.

[src src=”Source” url=”https://blogs.mcafee.com/consumer/everyone-loves-selfies-including-malware/”]Mcafee[/src]

[src src=”Image Source” url=”https://pixabay.com/en/selfie-mobile-phone-portrait-hood-1209886/”]PixBay/UnSplash[/src]

  • Tags
  • Android
  • Cyber Crime
  • hacking
  • Malware
  • Privacy
  • security
  • Smartphones
Facebook Twitter LinkedIn Pinterest
Previous article Nigerian Scammer Sentenced to 12 years in Prison for $84k Scams
Next article Construction Sign Hacked with Message for Chicago Mayor 'Rahm Lies, Children Die'
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism

Related Posts
SonicWall hacked after 0-day flaws exploited by hackers

SonicWall hacked after 0-day flaws exploited by hackers

Gamarue malware found in UK Govt-funded laptops for homeschoolers

Gamarue malware found in UK Govt-funded laptops for homeschoolers

Shazam Vulnerability exposed location of Android, iOS users

Shazam Vulnerability exposed location of Android, iOS users

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
SonicWall hacked after 0-day flaws exploited by hackers
Hacking News

SonicWall hacked after 0-day flaws exploited by hackers

52
Massive privacy risk as hacker sold 2 million MyFreeCams user records
Cyber Crime

Massive privacy risk as hacker sold 2 million MyFreeCams user records

100
Gamarue malware found in UK Govt-funded laptops for homeschoolers
Security

Gamarue malware found in UK Govt-funded laptops for homeschoolers

495

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us