mobile malware – PSafe Blog https://www.psafe.com/en/blog Articles and news about Mobile Security, Android, Apps, Social Media and Technology in general. Thu, 19 Jan 2023 14:49:21 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.3 https://www.psafe.com/en/blog/wp-content/uploads/2018/05/cropped-psafe_blog_purple-shield-32x32.png mobile malware – PSafe Blog https://www.psafe.com/en/blog 32 32 <![CDATA[What You Need to Know About Acecard Trojan Malware]]> https://www.psafe.com/en/blog/need-know-acecard-trojan-malware/ Fri, 04 Nov 2016 13:35:53 +0000 https://www.psafe.com/en/blog/?p=5428 There are seemingly endless ways that hackers can take advantage of your computer and ruin your life. Lately, the Acecard Trojan malware has been a popular hack on banking accounts. Here’s how the virus works:

First, the virus overlays banking applications with a phishing page that replicates your bank’s login page. The user enters their username and password into this phished page, granting the hacker access to their bank account. The virus proceeds to ask for credit and debit card data so they can take advantage of your finances. Once the data is stolen, it is sent to the hacker’s banking account or it is sold to a third party.

Read More: Mobile Malware is on the Rise — Find out Why

This epidemic wasn’t detected until February 2014, and even then it was considered a minor threat. However, in May 2015, the malicious activity began, and its problems have done nothing but proliferate since then. Between May and September of 2015, for instance, over 6000 users were attacked across the globe. The epidemic is mostly affecting Russia, Germany, Austria, France, and Australia.

Acecard is a considerable threat to mobile banking because of its power to override the security system of these applications. For instance, most bank account phishing overlays can only work on a few bank branches’ apps. Usually, the other banks have the capabilities to shut down the hacking, thus making the phishing scheme futile.

On the other hand, Acecard has the capability to override the security systems of thirty different banking and payment systems. As a result, this virus has had a dire impact on the mobile banking industry.

This Trojan malware isn’t the only malicious software attempting to hack money. According to the Kaspersky Lab, there was an estimated 2 million attempts to steal money via online access to banking accounts in the year of 2015.

The software is another type of breed because it can access your personal information beyond banking as well. On top of stealing your money, it can also steal your identity on social media. Facebook, Twitter, Instagram, WhatsApp, Viper, Skype, Paypal, Gmail, and more have all experienced the ugly hand of Acecard.

Will the Acecard fold? Hopefully so.

Want to learn more about computer security? Come to the PSafe blog!

]]>
<![CDATA[Top 5 spookiest malware to avoid this Halloween]]> https://www.psafe.com/en/blog/top-5-spookiest-malware-avoid-halloween/ Mon, 31 Oct 2016 22:20:01 +0000 https://www.psafe.com/en/blog/?p=5290 Today is Halloween and aside from trick or treating and costume parties, we’re still finding ourselves face to face with security breaches that affect our personal data. There are 5 spooky malware threats lingering that remind us how important is to keep our Android’s safe. Unsure if your phone was affected? Click below to scan your device and keep your device safe.

Run Virus Scan

Top 5 threats:

  1. Dresscode (downloaded 100,000 and 500,000 times)

At least 3,000 trojanized apps use this specific variant where the attacker is granted an array of personal data when victims are connected to the same network.

  1. Ghost Push

Android devices that are running version 5 or lower are the direct target to this on-going threat. The attack is spread when users download outside of the Google Play store or merely click a deceptive ad.

  1. Selfie Malware

This one masquerades as an app that asks individuals to take a selfie. During the process, the malware executes a code in the background that asks users for personal information including card info and everyone’s weakness…the selfie.

  1. GM Bot

This malware, once antiquated, has made a reboot to affect the latest versions of Android including Marshmellow. The malware creates an overlay on your Android device, logging every key-stroke users make. GM Bot even locks and blocks calls.

  1. Lockscreen Ransomware

Now in a newly powerful and resilient form, Lockscreen is keeping people from unlocking their phones on the latest versions of Android, as well as demanding a steep ransom payment.

To stop all 5 malware in its tracks, click below to scan your Android device.

Run Virus Scan

]]>
<![CDATA[PSafe identifies more than 500 apps infected by virus on Google Play Store]]> https://www.psafe.com/en/blog/psafe-identifies-500-apps-infected-virus-google-play-store/ Fri, 21 Oct 2016 18:41:32 +0000 https://www.psafe.com/en/blog/?p=4933 When even the Google Play Store has viruses, it’s important to step up your device security. PSafe identified more than 500 apps infected by virus on Android’s official App Store. Because of this security loophole, we recommend all PSafe Total users who downloaded apps recently, click below to remove threats.

Run Virus Scan

According to Emilio Simoni, PSafe’s security manager, famous games and social networks’ accessory or add-on apps used for Minecraft and Snapchat, are main targets so it’s important to stay completely protected. Apps for kids are under the crosshair for hackers. The kid app called Coloring Book, for example, is one of the infected apps. The list also features Mobi Music Player, a free digital music service, and the Mobi Cleaner, a cleanup app.

List of Apps Infected With Malware
PSafe Total app has already blocked almost 2,000 attacks affecting American users’ cellphones. In Brazil and Mexico, this number reached a successful 45,000. In order for your device to avoid such breach, it’s best to avoid the apps on the list above and keep a reliable antivirus installed – it’s your only defense against attacks like this.

Run Virus Scan

]]>
<![CDATA[Mobile Malware is on the Rise — Find out Why]]> https://www.psafe.com/en/blog/mobile-malware-rise-find/ Mon, 17 Oct 2016 18:18:34 +0000 https://www.psafe.com/en/blog/?p=4763 According to the 2016 Check Point Security Report, “Unknown malware downloads rose over 900% with more than 970 downloads per hour compared to 106 previously.” Why are attacks on mobile phones on the rise? Easy: most organizations and individuals have not bothered to take the time to proactively protect their personal data, like they do with their computers.

Mobile Phones a Target

Verizon’s 2015 Data Breach Investigations Report states that almost 90% of 2015 hacks used a vulnerability that has been in existence since 2002. Why are mobile phones becoming such a target? Consider all of the data that flows in and out of the typical mobile phone.

Read More: Your Guide to Controlling Your Permissions on Android

While not every company supplies its workforce with mobile phones, most employees carry one — and they may access company information, social networks, do a bit of web browsing, or download new apps from it during a typical workday.

These cellphones carry information for a slew of websites. They are typically always connected to the internet — and are capable of recording through audio and video. These kinds of extras are exactly what a thief is looking for. There’s a lot of information packed inside these phones and, for a high-profile target, personal, sensitive information can easily be obtained.

Lacking in Protection

Unlike desktop computers, mobile platforms don’t often possess anti-virus protection. There’s usually no sort of intrusion monitoring service. No one is performing frequent virus scans. At the same time, inexperienced developers are uploading apps that could make them easy to exploit. People use their phones everywhere, for everything, and download apps without thinking twice.

With chargeware and ransomware entering the scene, the problem can only escalate. So, a mobile phone could potentially be attacked, and that attack could go unnoticed for a significant period of time — all while data is being stolen right from under the mobile phone owner’s nose.

Part of the problem is the operating system bundled with some devices — it’s old, outdated, and may never be updated. Another part of the problem is deciding who needs to keep these phones protected. Should it be the responsibility of the network carrier or the operating system developer?

How To Protect Yourself

In a report from Alcatel and Lucent’s Kindsight Security Labs, it is stated that 15 million mobile devices are infected with malware. Consider that number for a moment. How safe is your Android cell phone?

Be proactive. Keep your cell phone safe while browsing the web. Install PSafe Total for advanced antivirus and malware protection. Let your phone stay safe and secure with PSafe.

]]>