- 4 hrs ago Here's How To Track All Your Digital Subscriptions
- 6 hrs ago YouTube Announces To Remove Private Messages Feature After September 18
- 7 hrs ago New Community Guidelines – Bans Employees From Making Political Debates
- 8 hrs ago OnePlus TV With MediaTek MT5670 SoC, Mali-G51 GPU, And 3GB RAM, To Arrive In September
- Movies Ananya Panday Spills The Beans On Her Dream Bollywood Wedding!
- Sports PKL 2019: Dabang Delhi bring champs Bengaluru Bulls down to earth
- News My dear friend Arun has left, says emotional Modi in Bahrain
- Lifestyle LFW W/F 2019 Day Three: Gaurang’s Latest Collection Is About Paithanis
- Automobiles Maruti Suzuki S-Presso India Launch Confirmed For The 30th Of September: Details & Specs
- Finance Gold Scales To Rs. 38,600 On Fed Powell Comments And Grim Trade War Outlook
- Education NTA To Conduct JNU Entrance Test JNUET In May 2020
- Travel Cycling for beginners: The basics any beginner cyclists should know
MysteryBot Android malware can steal your bank details
Don’t install any apps from unidentified sources on your smartphone.
Malware isn't uncommon among Android devices. A new Android malware has been discovered and it is said to combine a ransomware, a banking trojan and a keylogger on smartphones. Called MysteryBot, this malware is said to be capable of getting contacts and messages saved on the affected device, manipulate the banking apps and register keystrokes.
This malware was found by ThreatFabric and is similar to the LokiBot malware as both run on the same command and control server. This means that both the malware could have been created by the same attacker, claims the blog post. It adds that the MysteryBot can post more threats than LokiBot.
How harmful could MysteryBot be?
MysteryBot can steal the emails and start apps remotely. It targets users who are using devices running Android 7.0 Nougat and Android 8.0 Oreo. The malware is said to have a secret code, which can overlay a duplicate screen on the banking apps so that users add their credentials into the fake screen. It is said that these credentials are sent to a remote server, which is controlled by the hacker. Going by the blog post, several banks such as IDBI, HDFC, HSBC, ICICI, SBI, etc. are the prime targets of this malware.
In addition to the banking trojan, the MysteryBot malware has a keylogger, which can record every keystroke made on the affected device. Keylogger is a kind of surveillance software, which can record instant messages and emails and capture any detail that is typed using the keyboard. However, the blog post notes that the keystroke function of this malware is not fully functional. It appears to be under development.
The MysteryBot malware is said to have ransomware capabilities too. It can encrypt files on the external storage of the device. The encryption process adds each file in an individual ZIP archive, which is password protected. The password will be the same for the ZIP archives and is generated during the runtime. Once the encryption is completed, users will be greeted with a dialogue accusing the victim of having watched pornographic material.
May not spread to all users
MysteryBot can manipulate a service permission dubbed Package Usage Stats. It lets the trojan to change app permissions with the users' consent. Since the malware is under development, it looks like it will not be widespread. But it is recommended that users of Android devices refrain from installing apps from unverified sources.