• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • April 15th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Technology News
Android

Fake Adobe Flash Player App Infects Android Devices with Banking Malware

July 21st, 2017 Waqas Security, Android, Malware 0 comments
Fake Adobe Flash Player App Infects Android Devices with Banking Malware
Share on FacebookShare on Twitter

IT security researchers at Russia based Dr. Web cybersecurity firm have discovered a fake Adobe Flash Player infected with BankingBot malware known for stealing banking and personal data of Android users.

“BankingBot” was first spotted in April 2008 but about three months ago it was found infecting over 400 apps on Google Play Store. Once it infects a targeted device, it gains administrative privileges before removing the icon of the app, tricking the user into believing that the app has been deleted.

[irp posts=”23362″ name=”New Android Malware Spies on You even if Your Phone is Off”]

In reality, however, the app continues to work in the background. Furthermore, the malware spies on SMS sent by the user, collect sensitive information such as credit card numbers, CVC number, its expiration date and user’s home address. It is also able to collect device specs such as a list of installed apps, OS version, IMEI, and phone model and send it to the hacker.

That’s not all; the malware is designed to display fake screens disguised as banking apps. As soon as the app gets what it wants, the credentials are then passed on to the hacker through a control and command (C&C) server. It also tracks available text fields, such as menu elements, and logs keystrokes and other components of the user interface.

According to Dr.Web’s blog post, BankBot is targeting users in Australia, Turkey, Germany, Poland, France, the United Kingdom, and the USA. Also, there are several other apps infected with the malware. Here is a screen the researcher shared which shows the fake Adobe Flash App and how it make changes on an infected device.

As mentioned at the start, the BankingBot was first discovered in 2008, and it could be coincident that back then the malware was also spotted targeting users through a fake Adobe Flash Player App.

Android users need to take extra security precautions while downloading apps from Google Play Store or a third-party store since nothing is safe from these malicious programs. In the case of BankingBot, the targeted users are advised to run their device in safe mode, go to system settings, recall all the rights, restart the device and run a full device scan through an anti-virus software.

[irp posts=”54465″ name=”Hundreds of Malicious Android Apps Masked as Anti-virus Software”]


Sponsored: DDoS attacks are increasing, calculate the cost and probability of a DDoS attack on your business with this DDoS Downtime Cost Calculator.

  • Tags
  • Android
  • Banking
  • Google Play
  • hacking
  • internet
  • Malware
  • security
Facebook Twitter LinkedIn Pinterest
Previous article WikiLeaks Release Documents on How CIA Uses 5 Different Malware
Next article Tor Public Bug Bounty Program: Earn Up To $4000
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism

Related Posts
Unpatched MS Exchange servers hit by cryptojacking malware

Unpatched MS Exchange servers hit by cryptojacking malware

Indian supply-chain giant Bizongo exposed 643GB of sensitive data

Indian supply-chain giant Bizongo exposed 643GB of sensitive data

FBI accessing computers across US to remove malicious web shells

FBI accessing computers across US to remove malicious web shells

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Unpatched MS Exchange servers hit by cryptojacking malware
Security

Unpatched MS Exchange servers hit by cryptojacking malware

Indian supply-chain giant Bizongo exposed 643GB of sensitive data
Leaks

Indian supply-chain giant Bizongo exposed 643GB of sensitive data

FBI accessing computers across US to remove malicious web shells
Security

FBI accessing computers across US to remove malicious web shells

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us