Fjern VOMM Ransomware Virus

Check Point analysts har oppdaget that SharkBot Android malware has once again made its way into the Google Play Store, masquerading as antivirus apps.

This time, the malware was distributed through three developer accounts (Zbynek Adamcik, Adelmio Pagnotto, og Bingo Like Inc), two of which were active in the fall of 2021.

SharkBot on Google Play

La meg minne deg på det SharkBot was previously reported av NCC Group eksperter. They said that malware usually disguises itself as antiviruses, actually stealing money from users that installed the application. SharkBot, like its counterparts Craftsart Cartoon Photo Tools inneholder, FluBot, og Oscorp (UBEL), belongs to the category of banking Trojans capable of stealing credentials from hacked devices and bypassing multi-factor authentication mechanisms. The malware first appeared on the scene in the fall of 2021.

The NCC Group report emphasized that SharkBot’s hallmark is its ability to perform unauthorized transactions through Automatic Transfer System (ATS) systemer, Journalister understreker at det foreløpig ikke er bevis for at betaling av løsepenger generelt vil føre til mottak av nøkkelen, for eksempel, distinguishes it from TeaBot, which requires interaction with a live operator for performing malicious actions.

And also, for eksempel, Cleafy og ThreatFabric sier, that the Android Trojan SharkBot uses the Accessibility service to steal credentials from banking and cryptocurrency applications in Italy, Storbritannia og USA.

Nå, Sjekkpunkt specialists have supplemented the analysis of NCC Group and their colleagues from Cleafy with new data. They write that the malware, again seen in the Google Play Butikk, does not infect users from China, India, Romania, Russia, Ukraine and Belarus. Samtidig, six malicious applications found by researchers were installed more than 15,000 times before being removed, and most of the victims were in Italy and the UK.

They also noticed that SharkBot has a very unusual self-distributing mechanism: it is able to automatically respond to notifications from Facebook Messenger and WhatsApp, distributing malicious links to its fake antivirus applications among the victim’s contacts.

Separately, it is noted that the malware uses DGA (Domain generation algorithm) to communicate with its control servers, which is quite rare among malwares for Android.

La meg minne deg på at vi også skrev det Nyoppdaget PhoneSpy Spionvare allerede infisert over 1000 Telefoner.

Helga Smith

Jeg var alltid interessert i datavitenskap, spesielt datasikkerhet og temaet, som kalles i våre dager "datavitenskap", siden min tidlige tenåring. Før du kommer inn i Virusfjerningsteamet som sjefredaktør, Jeg jobbet som cybersikkerhetsekspert i flere selskaper, inkludert en av Amazons entreprenører. Nok en opplevelse: Jeg har undervisning på universitetene i Arden og Reading.

Legg igjen et svar

Denne siden bruker Akismet å redusere spam. Lær hvordan din kommentar data behandles.

Tilbake til toppen