Loading...
  1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Breaking News New Android Malware Targets 12 Indian Banking Apps and Stealing Login Information

Discussion in 'Android apps and APKs' started by youramit7, Jan 5, 2018.

  1. youramit7

    Verified Member

    Messages:
    82
    Location:
    Mathura
    Ratings:
    +14 / -0
    DTH:
    ddfd
    New Android Malware Targets 12 Indian Banking Apps and Stealing Login Information: Quick Heal

    Quick Heal Security Labs recently detected an Android Trojan Banking which explicitly targets banking apps. As per the report, this new Android malware targets 232 banking apps across the world, and the list includes 12 Indian banking apps from top-tier banks. The malware is known as Android.banker.A2f8a (Previously detected as Android.banker.A9480) as per Quick Heal.

    “Like most other Android banking malware, even this one is designed for stealing login credentials, hijacking SMSs, uploading contact lists and SMSs on a malicious server, displaying an overlay screen (to capture details) on top of legitimate apps and carrying out other such malicious activities,” said Quick Heal in the report.

    The malware Android.banker.A2f8a is being distributed through a fake Flash Player app on third-party stores. Once if the user installs the malicious app, it will keep on asking the user to activate admin rights. “And even if the user denies the request or kills the process, the app will keep throwing continuous pop-ups until the user activates the admin privilege. Once this is done, the malicious app hides its icon soon after the user taps on it,” the report added.

    Once if the user grants admin rights to the application, the application carries out malicious tasks in the background. If it founds out any of the banking application out of the 232 apps installed on the smartphone, it will throw a fake login page by which it steals the login information.

    Furthermore, the malicious application has the ability to intercept all incoming and outgoing SMSs from the infected device with which the attackers bypass the two-factor verification. And it also has the ability to transfer all the SMSs for your inbox to the service.

    That’s not all; it has a few more functionalities. The malware can also set the device’s ringer volume to silent in order to suppress SMS notifications. Here’s the list of targeted banks in India:

    Axis Mobile
    HDFC Bank MobileBanking
    SBI Anywhere Personal
    HDFC Bank MobileBanking LITE
    iMobile by ICICI Bank
    IDBI Bank GO Mobile+
    Abhay by IDBI Bank Ltd
    IDBI Bank GO Mobile
    IDBI Bank mPassbook
    Baroda mPassbook
    Union Bank Mobile Banking
    Union Bank Commercial Clients

    To stay away from this malicious attack, you should not install any flash player application, especially the ones with Adobe name. The flash player size is reportedly said to be 115KB. Also, Quick Heal noted that their security application detects this malware and alerts the user if any.
     
    • Like Like x 1
  2. SRIRAM

    SRIRAM DFI Riser
    DFI Premium Member

    Messages:
    1,834
    Location:
    Hyderabad
    Ratings:
    +660 / -0
    DTH:
    Tata Sky HD+D2H
    Mine HDFC uninstalled the app also dis-continued the online services
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...

Share This Page

Loading...
  • About Us

    DTH Forum India is India's Fastest Growing DTH, Digital Cable & Entertainment Discussion Forum. It provides a platform to share and gain knowledge related to Telecom, Broadband, Digital Cable, DTH, Mobiles, Tablets including all other Social and Political Topics. Our community pride ourselves on offering unbiased, critical discussion among people of all different backgrounds. We are working every day to make sure our community is one of the best.