• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 22nd, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Security
Malware

Dangerous Malware steals credit card information from Android devices

July 19th, 2014 Waqas Malware 0 comments
Dangerous Malware steals credit card information from Android devices
Share on FacebookShare on Twitter

Security experts at Dr. Web have warned Android users to be careful with a new Trojan that is stealing credit card details while making a transaction on Google Play store. It is currently targeting Russian users but a little bit of modification can let the criminals target people around the world.

The Trojan comes in the shape of a fake Adobe Flash Player, once installed and run, it asks for administrator privileges on the Android device after every 0.1 seconds. It does it by the continuously irritating user to grant it the admin privileges through a non-stop popup message. It will keep on asking until the user finally lets the Trojan take over the admin panel.

dangerous-trojan-steals-credit-card-information-from-android-devices

Dubbed as Android.BankBot.21, once the Trojan gets access to admin section; it checks if there is an active Google Play app window.

If one is present, the malware displays a standard credit card information form used to associate a credit card with an account, the researchers note. All the submitted information, such as the card number, expiration date, and CVC code, and the address and phone number of the cardholder, is transmitted to the attacker’s server.

dangerous-trojan-steals-credit-card-information-from-android-devices-2
The BankBot Android Trojan also collects sensitive information from the infected device such as credit card number, CVC number, its expiration date and user’s home address. It is also able to collect device specs such as a list of installed apps, OS version, IMEI, and phone model and send it to the hacker.

dangerous-trojan-steals-credit-card-information-from-android-devices-4

Last but not the least, the BankBot Android Trojan can also take over the phone’s SMS function and send messages to any number at any time. We at HackRead advise Android users to be careful of the fake flash player and don t fall for tricks used by cybercriminals.

[fullsquaread][/fullsquaread]

  • Tags
  • Android
  • app
  • Google Play Store
  • hacking
  • Malware
  • security
  • TROJAN
  • virus
Facebook Twitter LinkedIn Pinterest
Previous article Israel’s Channel 10 TV Station Hacked by Hamas
Next article Palestinians and Israelis take battle to social networks
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism

Related Posts
Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

Malware vendor returns with yet another nasty Android malware

Malware vendor returns with yet another nasty Android malware

Pakistani Android users hit by spyware campaign with malicious apps

Pakistani Android users hit by spyware campaign with malicious apps

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Shazam Vulnerability exposed location of Android, iOS users
Security

Shazam Vulnerability exposed location of Android, iOS users

59
Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet
Security

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

93
Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping
Security

Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping

111

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us