Dangerous FluBot malware offers users a security update to fight against itself

Experts from CERT NZ 發現 that the dangerous malware FluBot has begun using a new decoy to compromise Android devices. Attackers are trying to force users to infect their devices by showing them warnings about the need to urgently install some kind of security update, since the user’s device is allegedly already compromisedby the Flubot malware.

Your device is infected with FluBot® 惡意軟件. Android has detected that your device is infected. FluBot is an Android spyware designed to steal financial data and passwords from your device. You must install a security update for Android to remove FluBot.the message from the attackers says.

Potential victims are also asked to allow the installation of applications from untrusted sources if they see a warning that malware may be installed on their device.

If you clicked the link but took no further action, you should not be affected. 然而, CERT NZ strongly recommends that you change all your online account passwords and contact your bank as a precaution. If you entered any personal information into a form, especially credit card details, then we recommend you contact your bank and check for any unusual activity.CERT NZ experts recommend.

Attackers lure users to such fraudulent pages via SMS. Usually, such messages are disguised as missed parcel deliveries or photos allegedly stolen from the victim, which have already been uploaded to the network.

Let me remind you that FluBot usually spread to other Android phones by sending text messages to contacts previously stolen from other infected devices. Users are told to install malicious applications in the form of APK files delivered from servers controlled by attackers.

Once deployed, the malware tries to trick the victim into granting additional rights on the device via the Android Accessibility service, which will allow it to hide and execute malicious tasks in the background. Ultimately, FluBot will take over the infected device, gaining access to payment and banking information.

The malware also steals and forwards the victim’s address book to its control server (and contacts are transmitted to other FluBot spam bots), monitors system notifications about application activity, reads SMS messages, and can make phone calls.

Let me remind you that we talked about the fact that The new version of the Jupyter malware is distributed through the MSI installer.

黑尔加·史密斯

我一直對電腦科學感興趣, 尤其是數據安全和主題, 而家被稱為 "數據科學", 由我十幾歲開始. 在進入病毒清除團隊擔任主編之前, 我曾喺多傢公司擔任網絡安全專家, 包括亞馬遜嘅承包商之一. 另一種體驗: 我在雅頓大學同雷丁大學任教.

留言

本網站使用Akismet嚟減垃圾郵件. 瞭解如何處理評論數據.

“返回頂部”按鈕