How Malware Uses Fake Login Screens to Gain Personal Info
Known for stealing usernames and passwords, keystroke-logging malware has been a danger to computers for years. This threat is now attacking Androids, too.
Session-hijacking is now a very real concern for cell phone users worldwide. Recently, a threat known as “overlay malware” has begun appearing on Android devices. Impersonating login pages from popular websites, this malware steals a user’s name and password through keystroke-logging. These hacked sites are often ones that hold a person’s most confidential information, such as their bank and social media accounts. Giving up this personal data to hackers can lead to disastrous consequences, such as identity fraud and theft. Click here to scan your device for malware and keep your personal information safe:
Read More: Dangerous New Android Malware Discovered
Recent Appearances of Keystroke-Logging Malware
Back in August 2016, keystroke-logging malware had infected Google’s AdSense Network. The Moscow security company warned Android users about a malware that would attack when they visited certain Russian news sites. These unsuspecting visitors didn’t even need to click on anything. The so-called “last-browser-update.apk” would simply download itself onto their phone. Turns out, last-browser-update.apk is a banking Trojan. Banking Trojans are specifically designed to steal a user’s online banking information.
Similarly, Netflix suffered a phishing scan at the beginning of 2017. In January, users were targeted with emails, pretending to be sent by the popular streaming site. These phishing emails would ask for the user’s login details, then proceed to acquire their credit card information. This keystroke malware was so thorough in its design that it even gave Netflix users the option of logging in through Facebook. When the phishing attack ended, it brought users to the real Netflix page. Click here to protect yourself from phishing attacks and malicious websites with the Anti-Hacking feature: