Jithin91
Contributor
- Joined
- 31 Jan 2017
- Messages
- 2,134
- Reaction score
- 3,577
New Android Malware Targets 12 Indian Banking Apps and Stealing Login Information: Quick Heal
Quick Heal Security Labs recently detected an Android Trojan Banking which explicitly targets banking apps. As per the report, this new Android malware targets 232 banking apps across the world, and the list includes 12 Indian banking apps from top-tier banks. The malware is known as Android.banker.A2f8a (Previously detected as Android.banker.A9480) as per Quick Heal.
Is designed for stealing login credentials, hijacking SMSs, uploading contact lists and SMSs on a malicious server, displaying an overlay screen (to capture details) on top of legitimate apps and carrying out other such malicious activities,” said Quick Heal in the report. The malware Android.banker.A2f8a is being distributed through a fake Flash Player app on third-party stores. Once if the user installs the malicious app, it will keep on asking the user to activate admin rights. “And even if the user denies the request or kills the process, the app will keep throwing continuous pop-ups until the user activates the admin privilege. Once this is done, the malicious app hides its icon soon after the user taps on it,” the report added.
Here’s the list of targeted banks in India:
Axis Mobile
HDFC Bank MobileBanking
SBI Anywhere Personal
HDFC Bank MobileBanking LITE
iMobile by ICICI Bank
IDBI Bank GO Mobile+
Abhay by IDBI Bank Ltd
IDBI Bank GO Mobile
IDBI Bank mPassbook
Baroda mPassbook
Union Bank Mobile Banking
Union Bank Commercial Clients
In Detail: Android banking Trojan targets more than 232 apps including apps offered by Indian banks - Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice
Quick Heal Security Labs recently detected an Android Trojan Banking which explicitly targets banking apps. As per the report, this new Android malware targets 232 banking apps across the world, and the list includes 12 Indian banking apps from top-tier banks. The malware is known as Android.banker.A2f8a (Previously detected as Android.banker.A9480) as per Quick Heal.
Is designed for stealing login credentials, hijacking SMSs, uploading contact lists and SMSs on a malicious server, displaying an overlay screen (to capture details) on top of legitimate apps and carrying out other such malicious activities,” said Quick Heal in the report. The malware Android.banker.A2f8a is being distributed through a fake Flash Player app on third-party stores. Once if the user installs the malicious app, it will keep on asking the user to activate admin rights. “And even if the user denies the request or kills the process, the app will keep throwing continuous pop-ups until the user activates the admin privilege. Once this is done, the malicious app hides its icon soon after the user taps on it,” the report added.
Here’s the list of targeted banks in India:
Axis Mobile
HDFC Bank MobileBanking
SBI Anywhere Personal
HDFC Bank MobileBanking LITE
iMobile by ICICI Bank
IDBI Bank GO Mobile+
Abhay by IDBI Bank Ltd
IDBI Bank GO Mobile
IDBI Bank mPassbook
Baroda mPassbook
Union Bank Mobile Banking
Union Bank Commercial Clients
In Detail: Android banking Trojan targets more than 232 apps including apps offered by Indian banks - Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice