Categories: Security

Hackers Used Legitimate Apps to Attack Banks in 40 Countries

Researchers have discovered that hackers are using trusted applications to attack banks and government institutions. In every single attack, hackers exploited legitimate and reputable apps and left no clues in logs or any other data storage devices. So far, attacks have occurred over 140 times and in 40 different countries including the U.S., U.K., Brazil, France and Spain. DFNDR app has the ability to help you locate previously unidentified viruses and keep your devices secure. Given the frequency of these cyberattacks, it’s more important than ever to click below and check if you’re infected:


DFNDR detects more than 30,000 threats every day in the U.S. alone. Among its many features, the Security Scan lets you quickly verify phone and app files in order to scan for viruses and fix any security breaches. Like the hackers in these recent attacks, the Googligan strain (one of the many viruses detected by DFNDR’s features) has been known to exploit a variety of legitimate software — posing, for example, as porn sites or 3rd party app stores.

The virus steals tokens from devices in order to impersonate a user’s Google account and download apps, steal personal photos and files, and post fake app reviews. Since August 2016, it has infected more than 1.3 million Android phones. Within this same period, DFNDR has identified 4,637 strands of the virus and blocked the malware over 3.1 million times.

By scanning your device now with DFNDR, you are ensuring the safety of your private information, personal photos and files, and important apps. Click the button below to run a quick Security Scan:

PSafe Newsroom

The dfndr blog is an informative channel that presents exclusive content on security and privacy in the mobile and business world, with tips to keep users protected. Populated by a select group of expert reporters, the channel has a partnership with dfndr lab's security team. Together they bring you, first-notice news about attacks, scams, internet vulnerabilities, malware and everything affecting cybersecurity.

Recent Posts

Vulnerabilities in Cyber Security: what they are and how to fix them?

Learn all about one of the hackers' favorite breach method and keep your company safe…

1 year ago

3 ways to recover deleted photos on Android

Have you ever wondered how to recover deleted photos on Android? After all, the lack…

1 year ago

What is worm?

Digital worms are among the most serious threats in the wild kingdom of the Internet.

2 years ago

Spoofing: What’s it all about?

Spoofing is a fairly sophisticated virtual scam that can fool even the most cautious and…

2 years ago

Careful With That QR Code! Five Steps For QR Code Safety

Five Steps to Reduce QR Code Risk! Step one? Read this article…

2 years ago

Pharming: Phishing’s Nasty Big Brother

Pharming is creating a new, dangerous brand of impostor syndrome. Check how to avoid pharming…

2 years ago