VOMM Ransomware Virüsünü Kaldırın

Check Point analysts keşfetti that SharkBot Android malware has once again made its way into the Google Play Store, masquerading as antivirus apps.

This time, the malware was distributed through three developer accounts (Zbynek Adamcik, Adelmio Pagnotto, ve Bingo Like Inc), two of which were active in the fall of 2021.

Yeni Tarrask kötü amaçlı yazılımı

sana şunu hatırlatmama izin ver KöpekbalığıBot was previously reported tarafından NCC Group uzmanlar. They said that malware usually disguises itself as antiviruses, actually stealing money from users that installed the application. KöpekbalığıBot, like its counterparts Bu hileler onu atlamasına yardımcı oldu., FluBot, ve Oscorp (UBEL), belongs to the category of banking Trojans capable of stealing credentials from hacked devices and bypassing multi-factor authentication mechanisms. The malware first appeared on the scene in the fall of 2021.

The NCC Group report emphasized that SharkBot’s hallmark is its ability to perform unauthorized transactions through Automatic Transfer System (ATS) sistemler, saldırganlar aynı adrese iade işlemi yapacaklarını bildirirler., Örneğin, distinguishes it from TeaBot, which requires interaction with a live operator for performing malicious actions.

And also, Örneğin, Cleafy ve Tehdit Kumaşı diyor, that the Android Trojan SharkBot uses the Accessibility service to steal credentials from banking and cryptocurrency applications in Italy, Birleşik Krallık ve Amerika Birleşik Devletleri.

şimdi, Kontrol Noktası specialists have supplemented the analysis of NCC Group and their colleagues from Cleafy with new data. They write that the malware, again seen in the Google Oyun mağazası, does not infect users from China, Hindistan, Romania, Russia, Ukraine and Belarus. Aynı zamanda, six malicious applications found by researchers were installed more than 15,000 times before being removed, and most of the victims were in Italy and the UK.

They also noticed that SharkBot has a very unusual self-distributing mechanism: it is able to automatically respond to notifications from Facebook Messenger and WhatsApp, distributing malicious links to its fake antivirus applications among the victim’s contacts.

Separately, it is noted that the malware uses DGA (Domain generation algorithm) to communicate with its control servers, which is quite rare among malwares for Android.

şunu da yazdığımızı hatırlatalım Yeni keşfedilen TelefonCasus Casus Yazılım Zaten Etkilendi 1000 telefonlar.

Helga Smith

Bilgisayar bilimlerine her zaman ilgi duymuşumdur., özellikle veri güvenliği ve tema, günümüzde denilen "veri bilimi", ilk gençlik yıllarımdan beri. Baş Editör olarak Virüs Temizleme ekibine gelmeden önce, Birkaç şirkette siber güvenlik uzmanı olarak çalıştım, Amazon'un yüklenicilerinden biri dahil. Başka bir deneyim: Arden ve Reading üniversitelerinde öğretmenlik var.

Cevap bırakın

Bu site spam azaltmak için Akismet kullanır. Yorumunuz verileri işlenirken öğrenin.

Başa dön tuşu