Just In
- 35 min ago
WhatsApp Stickers For Republic Day: How To Send WhatsApp Stickers On Android, iOS
- 9 hrs ago
Realme Race Launch Officially Teased; Likely To Hit The Stores In February
- 11 hrs ago
Amazon Republic Day Edition Spin And Win Contest: Win OnePlus 8T And More
- 12 hrs ago
OnePlus Buds Z Steven Harrington Edition TWS Earbuds Launched For Rs. 3,699
Don't Miss
- News
Republic Day 2021: India’s military might to be on display today
- Movies
Republic Day 2021: Tejas, Udham Singh Biopic And Other Upcoming Films That Will Raise Your Spirits
- Sports
Sri Lanka vs England Test Series 2021: Full List of Award Winners, Records and Statistics; Joe Root stars
- Finance
5 Stock Picks Ahead Of The Budget From HDFC Securities
- Automobiles
2021 Benelli TRK 502 Spotted Arriving At Dealerships In India: Launching Soon?
- Lifestyle
Kareena Kapoor Khan Wins Us With Her Radiant Style In Gym Wear; Much-needed Goals!
- Travel
Best Places To Visit In Gujarat In January 2021
- Education
MHT CET 2020 Round II Seat Allotment Result for B. Tech, B. Pharma To Be Out Today
MysteryBot Android malware can steal your bank details
Don’t install any apps from unidentified sources on your smartphone.
Malware isn't uncommon among Android devices. A new Android malware has been discovered and it is said to combine a ransomware, a banking trojan and a keylogger on smartphones. Called MysteryBot, this malware is said to be capable of getting contacts and messages saved on the affected device, manipulate the banking apps and register keystrokes.
This malware was found by ThreatFabric and is similar to the LokiBot malware as both run on the same command and control server. This means that both the malware could have been created by the same attacker, claims the blog post. It adds that the MysteryBot can post more threats than LokiBot.
How harmful could MysteryBot be?
MysteryBot can steal the emails and start apps remotely. It targets users who are using devices running Android 7.0 Nougat and Android 8.0 Oreo. The malware is said to have a secret code, which can overlay a duplicate screen on the banking apps so that users add their credentials into the fake screen. It is said that these credentials are sent to a remote server, which is controlled by the hacker. Going by the blog post, several banks such as IDBI, HDFC, HSBC, ICICI, SBI, etc. are the prime targets of this malware.
In addition to the banking trojan, the MysteryBot malware has a keylogger, which can record every keystroke made on the affected device. Keylogger is a kind of surveillance software, which can record instant messages and emails and capture any detail that is typed using the keyboard. However, the blog post notes that the keystroke function of this malware is not fully functional. It appears to be under development.
The MysteryBot malware is said to have ransomware capabilities too. It can encrypt files on the external storage of the device. The encryption process adds each file in an individual ZIP archive, which is password protected. The password will be the same for the ZIP archives and is generated during the runtime. Once the encryption is completed, users will be greeted with a dialogue accusing the victim of having watched pornographic material.
May not spread to all users
MysteryBot can manipulate a service permission dubbed Package Usage Stats. It lets the trojan to change app permissions with the users' consent. Since the malware is under development, it looks like it will not be widespread. But it is recommended that users of Android devices refrain from installing apps from unverified sources.
-
21,999
-
1,04,999
-
49,999
-
64,999
-
54,535
-
1,19,900
-
49,999
-
86,999
-
59,499
-
49,990
-
20,699
-
49,999
-
11,499
-
49,999
-
7,999
-
8,980
-
17,091
-
10,999
-
34,999
-
39,600
-
17,985
-
7,895
-
40,620
-
56,444
-
16,999
-
15,050
-
22,590
-
24,500
-
14,500
-
22,000