Notice: amp_is_available was called incorrectly. `amp_is_available()` (or `amp_is_request()`, formerly `is_amp_endpoint()`) was called too early and so it will not work properly. WordPress is currently doing the `pre_get_posts` hook. Calling this function before the `wp` action means it will not have access to `WP_Query` and the queried object to determine if it is an AMP response, thus neither the `amp_skip_post()` filter nor the AMP enabled toggle will be considered. It appears the theme with slug `publisher` is responsible; please contact the author. Please see Debugging in WordPress for more information. (This message was added in version 2.0.0.) in /home/runcloud/webapps/techilive/wp-includes/functions.php on line 5313
How criminals get Android users to install fake versions of popular apps - Times of India - TechiLive.in

How criminals get Android users to install fake versions of popular apps – Times of India

0

There is a new threat for Android users that has come to light in the latest report by Bitdefender.
According to their report, cybercriminals are offering new malicious Android applications that impersonate popular apps but are infected with TeaBot and Flubot that are from banker trojan families.
The Teabot trojan can carry out overlay attacks via Android Accessibility Services, intercept messages, perform various keylogging activities, steal Google Authentication codes, and even take full remote control of Android devices.
Hackers imitate top-rated apps with the hopes of tricking at least some users into downloading and installing their malicious versions. The researcher claims that fake apps housing the Teabot payload are based on popular apps residing on Google Play, some with as many as 50 million downloads.
The report also found that hackers have also been spreading Teabot using a fake Ad Blocker app that acts as a dropper for the malware.
“The fake Ad Blocker apps don’t have any of the functionality of the original version. They ask permission to display over other applications, show notifications, and install applications outside of Google Play, after which they hide the icon,” said the report.
Besides this, the other trojan that has been spotted is called Flubot. This is more widespread internationally, predominantly in Germany, Spain, Italy and the UK.
Unlike Teabot, which is sometimes dropped by an app posing as an ad blocker, Flubot operators have a much more direct campaign, using spam SMS as a means of delivery.
Flubot is said to steal banking, contact, SMS and other types of private data from infected devices, and has an arsenal of other commands available, including the ability to send an SMS.
According to the report, Android users can avoid infection with either of these two threats by never installing apps from outside the official store. It also advises to never tap on links in messages and always be mindful of your Android apps’ permissions.

Stay connected with us on social media platform for instant update click here to join our  Twitter, & Facebook

Loading...

We are now on Telegram. Click here to join our channel (@TechiUpdate) and stay updated with the latest Technology headlines.

For all the latest Technology News Click Here 

 For the latest news and updates, follow us on Google News

Loading...

Read original article here

Denial of responsibility! TechiLive.in is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – admin@techilive.in. The content will be deleted within 24 hours.

Leave a comment