Dangerous FluBot malware offers users a security update to fight against itself

Experts from CERT NZ have discovered that the dangerous malware FluBot has begun using a new decoy to compromise Android devices. Attackers are trying to force users to infect their devices by showing them warnings about the need to urgently install some kind of security update, since the user’s device is allegedly already compromisedby the Flubot malware.

Your device is infected with FluBot® malware. Android has detected that your device is infected. FluBot is an Android spyware designed to steal financial data and passwords from your device. You must install a security update for Android to remove FluBot.the message from the attackers says.

Potential victims are also asked to allow the installation of applications from untrusted sources if they see a warning that malware may be installed on their device.

If you clicked the link but took no further action, you should not be affected. البتہ, CERT NZ strongly recommends that you change all your online account passwords and contact your bank as a precaution. If you entered any personal information into a form, especially credit card details, then we recommend you contact your bank and check for any unusual activity.CERT NZ experts recommend.

Attackers lure users to such fraudulent pages via SMS. Usually, such messages are disguised as missed parcel deliveries or photos allegedly stolen from the victim, which have already been uploaded to the network.

Let me remind you that FluBot usually spread to other Android phones by sending text messages to contacts previously stolen from other infected devices. Users are told to install malicious applications in the form of APK files delivered from servers controlled by attackers.

Once deployed, the malware tries to trick the victim into granting additional rights on the device via the Android Accessibility service, which will allow it to hide and execute malicious tasks in the background. Ultimately, FluBot will take over the infected device, gaining access to payment and banking information.

The malware also steals and forwards the victim’s address book to its control server (and contacts are transmitted to other FluBot spam bots), monitors system notifications about application activity, reads SMS messages, and can make phone calls.

Let me remind you that we talked about the fact that The new version of the Jupyter malware is distributed through the MSI installer.

ہیلگا اسمتھ

مجھے ہمیشہ کمپیوٹر سائنسز میں دلچسپی تھی۔, خاص طور پر ڈیٹا سیکیورٹی اور تھیم, جسے آج کل کہا جاتا ہے۔ "ڈیٹا سائنس", میری ابتدائی نوعمری سے. ایڈیٹر ان چیف کے طور پر وائرس ہٹانے والی ٹیم میں آنے سے پہلے, میں نے کئی کمپنیوں میں سائبر سیکیورٹی کے ماہر کے طور پر کام کیا۔, ایمیزون کے ٹھیکیداروں میں سے ایک سمیت. ایک اور تجربہ: مجھے آرڈن اور ریڈنگ یونیورسٹیوں میں پڑھانا ملا ہے۔.

جواب چھوڑیں

یہ سائٹ سپیم کو کم کرنے کے لیے Akismet کا استعمال کرتی ہے۔. جانیں کہ آپ کے تبصرے کے ڈیٹا پر کیسے کارروائی کی جاتی ہے۔.

واپس اوپر کے بٹن پر