According to a report from ThreatFabric (opens in new tab), these malicious apps pose as finance trackers and other utilities like file managers to trick potential victims into downloading them in the first place. However, this appears to be working as the five malicious apps discovered by the firm’s researchers have been downloaded over 100,000 times combined. Even though Google scans apps submitted to the Play Store for malware and other viruses, the apps in question were able to slip past its defenses as they don’t actually contain any malicious code. Instead, these apps are known as malware droppers since they download their malicious payloads onto one of the best Android phones after being installed. In ThreatFabric’s report, the fraud detection firm says that there has been an uptick recently in the use of malware droppers by cybercriminals as they offer an easier way to infect vulnerable devices with a much lower chance of being discovered.
Remove these apps from your devices immediately
If you have any of the apps listed below installed on your Android smartphone or tablet, you will need to manually delete them immediately. However, it’s also worth taking a look at Threat Fabric’s research, as the firm has also included a list at the end of its blog post with all the banking apps and crypto wallets targeted by the malware these droppers leave on an infected device.
Codice Fiscale 2022 - 10,000 downloadsFile Manager Small, Lite - 1,000 downloadsRecover Audio, Images & Videos – 100,000 downloadsZetter Authentication – 10,000 downloadsMy Finances Tracker – 1,000 downloads
Using malware droppers to spread banking trojans
The app ‘Codice Fiscale 2022’ targets Italian users looking to calculate tax payments but once installed on a user’s device, it drops the SharkBot banking trojan. Likewise, the app ‘File Manager, Small, Lite’ also drops this same Android malware. SharkBot has been growing in popularity over the past few months and it is used by cybercriminals to steal banking and other credentials from victims by displaying fake overlays when they try to login. According to ThreatFabric, this banking trojan is capable of stealing usernames and passwords from Barclays, Citi, Capital One, Wells Fargo, PayPal and other banking apps but it can also intercept 2FA codes sent via text, perform keylogging and remotely take over an infected device. Both of the apps in question infect user devices with SharkBot by prompting them to install a fake update which is hosted on a site designed to look like the Play Store. While examining the URL would show the update is fake, newer versions of Android warn users when an app requests to use the “REQUEST_INSTALL_PACKAGES” permission according to BleepingComputer. The apps ‘Recover Audio, Images & Videos,’ ‘Zetter Authentication,’ and ‘My Finances Tracker’ work in a similar way but drop the Vultur malware instead of SharkBot. However, like the former, Vultur can remotely stream the contents of your smartphone’s screen and perform keylogging on your device. All of this data is sent back to the cybercriminals responsible and is then used to commit fraud. These three malicious apps also display a request to install a fake update disguised as a Play Store notice after being loaded onto a victim’s phone. If a user installs this fake update, their smartphone is then infected with the Vultur malware. In this campaign though, ThreatFabric’s researchers spotted a new Vultur variant that can also perform UI logging and record clicks, gestures and every other action a victim takes on their smartphone. When it comes to banking apps and crypto wallets, this malware targets crypto.com, Amex, Barclays, Coinbase, eToro, Robinhood, Cash App and many other popular financial services.
How to stay safe from banking trojans and other malware
As such, you need to be extra careful when installing apps onto your Android smartphone or tablet. Before installing any new app, you first need to consider whether or not you really need it. From there, you should read the reviews and check the app’s rating on the Play Store but looking at external reviews (preferably video reviews) is a good idea as well since cybercriminals often use fake reviews to make their bad apps seem more appealing. Thankfully, malware droppers - like the five malicious apps described above – often require you to install an update after putting them on your phone. If an app tries to do this and the update isn’t being delivered by Google through the Play Store, this is a major red flag and you should delete the app in question immediately. As for staying safe from malware, you’ll want to ensure that Google Play Protect is enabled on your Android devices since it automatically scans for malware in the background. For additional protection though, you’ll also want to install one of the best Android antivirus apps on your smartphone or tablet. Google’s engineers work tirelessly to rid the Play Store of malicious apps. However, since they don’t contain any malicious code, malware droppers are more likely to bypass the search giant’s security measures, which is why you always need to watch out when installing any new app on your Android devices.
title: “These Android Apps Can Steal Your Banking Info By Recording Your Screen Delete Them Now” ShowToc: true date: “2022-11-05” author: “Teresa Ball”
According to a report from ThreatFabric (opens in new tab), these malicious apps pose as finance trackers and other utilities like file managers to trick potential victims into downloading them in the first place. However, this appears to be working as the five malicious apps discovered by the firm’s researchers have been downloaded over 100,000 times combined. Even though Google scans apps submitted to the Play Store for malware and other viruses, the apps in question were able to slip past its defenses as they don’t actually contain any malicious code. Instead, these apps are known as malware droppers since they download their malicious payloads onto one of the best Android phones after being installed. In ThreatFabric’s report, the fraud detection firm says that there has been an uptick recently in the use of malware droppers by cybercriminals as they offer an easier way to infect vulnerable devices with a much lower chance of being discovered.
Remove these apps from your devices immediately
If you have any of the apps listed below installed on your Android smartphone or tablet, you will need to manually delete them immediately. However, it’s also worth taking a look at Threat Fabric’s research, as the firm has also included a list at the end of its blog post with all the banking apps and crypto wallets targeted by the malware these droppers leave on an infected device.
Codice Fiscale 2022 - 10,000 downloadsFile Manager Small, Lite - 1,000 downloadsRecover Audio, Images & Videos – 100,000 downloadsZetter Authentication – 10,000 downloadsMy Finances Tracker – 1,000 downloads
Using malware droppers to spread banking trojans
The app ‘Codice Fiscale 2022’ targets Italian users looking to calculate tax payments but once installed on a user’s device, it drops the SharkBot banking trojan. Likewise, the app ‘File Manager, Small, Lite’ also drops this same Android malware. SharkBot has been growing in popularity over the past few months and it is used by cybercriminals to steal banking and other credentials from victims by displaying fake overlays when they try to login. According to ThreatFabric, this banking trojan is capable of stealing usernames and passwords from Barclays, Citi, Capital One, Wells Fargo, PayPal and other banking apps but it can also intercept 2FA codes sent via text, perform keylogging and remotely take over an infected device. Both of the apps in question infect user devices with SharkBot by prompting them to install a fake update which is hosted on a site designed to look like the Play Store. While examining the URL would show the update is fake, newer versions of Android warn users when an app requests to use the “REQUEST_INSTALL_PACKAGES” permission according to BleepingComputer. The apps ‘Recover Audio, Images & Videos,’ ‘Zetter Authentication,’ and ‘My Finances Tracker’ work in a similar way but drop the Vultur malware instead of SharkBot. However, like the former, Vultur can remotely stream the contents of your smartphone’s screen and perform keylogging on your device. All of this data is sent back to the cybercriminals responsible and is then used to commit fraud. These three malicious apps also display a request to install a fake update disguised as a Play Store notice after being loaded onto a victim’s phone. If a user installs this fake update, their smartphone is then infected with the Vultur malware. In this campaign though, ThreatFabric’s researchers spotted a new Vultur variant that can also perform UI logging and record clicks, gestures and every other action a victim takes on their smartphone. When it comes to banking apps and crypto wallets, this malware targets crypto.com, Amex, Barclays, Coinbase, eToro, Robinhood, Cash App and many other popular financial services.
How to stay safe from banking trojans and other malware
As such, you need to be extra careful when installing apps onto your Android smartphone or tablet. Before installing any new app, you first need to consider whether or not you really need it. From there, you should read the reviews and check the app’s rating on the Play Store but looking at external reviews (preferably video reviews) is a good idea as well since cybercriminals often use fake reviews to make their bad apps seem more appealing. Thankfully, malware droppers - like the five malicious apps described above – often require you to install an update after putting them on your phone. If an app tries to do this and the update isn’t being delivered by Google through the Play Store, this is a major red flag and you should delete the app in question immediately. As for staying safe from malware, you’ll want to ensure that Google Play Protect is enabled on your Android devices since it automatically scans for malware in the background. For additional protection though, you’ll also want to install one of the best Android antivirus apps on your smartphone or tablet. Google’s engineers work tirelessly to rid the Play Store of malicious apps. However, since they don’t contain any malicious code, malware droppers are more likely to bypass the search giant’s security measures, which is why you always need to watch out when installing any new app on your Android devices.
title: “These Android Apps Can Steal Your Banking Info By Recording Your Screen Delete Them Now” ShowToc: true date: “2022-12-31” author: “Robert Billings”
According to a report from ThreatFabric (opens in new tab), these malicious apps pose as finance trackers and other utilities like file managers to trick potential victims into downloading them in the first place. However, this appears to be working as the five malicious apps discovered by the firm’s researchers have been downloaded over 100,000 times combined. Even though Google scans apps submitted to the Play Store for malware and other viruses, the apps in question were able to slip past its defenses as they don’t actually contain any malicious code. Instead, these apps are known as malware droppers since they download their malicious payloads onto one of the best Android phones after being installed. In ThreatFabric’s report, the fraud detection firm says that there has been an uptick recently in the use of malware droppers by cybercriminals as they offer an easier way to infect vulnerable devices with a much lower chance of being discovered.
Remove these apps from your devices immediately
If you have any of the apps listed below installed on your Android smartphone or tablet, you will need to manually delete them immediately. However, it’s also worth taking a look at Threat Fabric’s research, as the firm has also included a list at the end of its blog post with all the banking apps and crypto wallets targeted by the malware these droppers leave on an infected device.
Codice Fiscale 2022 - 10,000 downloadsFile Manager Small, Lite - 1,000 downloadsRecover Audio, Images & Videos – 100,000 downloadsZetter Authentication – 10,000 downloadsMy Finances Tracker – 1,000 downloads
Using malware droppers to spread banking trojans
The app ‘Codice Fiscale 2022’ targets Italian users looking to calculate tax payments but once installed on a user’s device, it drops the SharkBot banking trojan. Likewise, the app ‘File Manager, Small, Lite’ also drops this same Android malware. SharkBot has been growing in popularity over the past few months and it is used by cybercriminals to steal banking and other credentials from victims by displaying fake overlays when they try to login. According to ThreatFabric, this banking trojan is capable of stealing usernames and passwords from Barclays, Citi, Capital One, Wells Fargo, PayPal and other banking apps but it can also intercept 2FA codes sent via text, perform keylogging and remotely take over an infected device. Both of the apps in question infect user devices with SharkBot by prompting them to install a fake update which is hosted on a site designed to look like the Play Store. While examining the URL would show the update is fake, newer versions of Android warn users when an app requests to use the “REQUEST_INSTALL_PACKAGES” permission according to BleepingComputer. The apps ‘Recover Audio, Images & Videos,’ ‘Zetter Authentication,’ and ‘My Finances Tracker’ work in a similar way but drop the Vultur malware instead of SharkBot. However, like the former, Vultur can remotely stream the contents of your smartphone’s screen and perform keylogging on your device. All of this data is sent back to the cybercriminals responsible and is then used to commit fraud. These three malicious apps also display a request to install a fake update disguised as a Play Store notice after being loaded onto a victim’s phone. If a user installs this fake update, their smartphone is then infected with the Vultur malware. In this campaign though, ThreatFabric’s researchers spotted a new Vultur variant that can also perform UI logging and record clicks, gestures and every other action a victim takes on their smartphone. When it comes to banking apps and crypto wallets, this malware targets crypto.com, Amex, Barclays, Coinbase, eToro, Robinhood, Cash App and many other popular financial services.
How to stay safe from banking trojans and other malware
As such, you need to be extra careful when installing apps onto your Android smartphone or tablet. Before installing any new app, you first need to consider whether or not you really need it. From there, you should read the reviews and check the app’s rating on the Play Store but looking at external reviews (preferably video reviews) is a good idea as well since cybercriminals often use fake reviews to make their bad apps seem more appealing. Thankfully, malware droppers - like the five malicious apps described above – often require you to install an update after putting them on your phone. If an app tries to do this and the update isn’t being delivered by Google through the Play Store, this is a major red flag and you should delete the app in question immediately. As for staying safe from malware, you’ll want to ensure that Google Play Protect is enabled on your Android devices since it automatically scans for malware in the background. For additional protection though, you’ll also want to install one of the best Android antivirus apps on your smartphone or tablet. Google’s engineers work tirelessly to rid the Play Store of malicious apps. However, since they don’t contain any malicious code, malware droppers are more likely to bypass the search giant’s security measures, which is why you always need to watch out when installing any new app on your Android devices.