News

The malware researchers at threat intelligence outfit Intel 471 first spotted the new Android banking trojan on July 24, when it was seen primarily targeting Turkish users. Although BlankBot is ...
The original Cerberus Trojan targeted over 450 Android banking and social media apps. Its effectiveness has led to “forks” such as Alien, ERMAC, Phoenix, and ErrorFather.
For Android users, the installation of this fake banking app can lead to significant financial losses. Once the malware is active, it can capture login credentials, account numbers and even ...
Multiple Android devices have been infected by a new trojan dubbed “ToxicPanda”. It primarily targets bank accounts but spoofs common apps to infect devices. Smartphones are now one of the ...
A new banking Trojan targeting Android devices has been detected by Cyble Research and Intelligence Labs (CRIL), the research branch of threat intelligence provider Cycble. In a report published on ...
3) Download apps from reliable sources: It's important to download apps only from trusted sources like the Google Play Store. They have strict checks to prevent malware and other harmful software.
Cyble suspects that the new banking trojan targeting Android devices is of Russian origin. Researchers found strings or entries in Russian while exploring the infected app.
However, a sophisticated banking trojan like this could easily be reconfigured to target Android users in the U.S., the U.K. and in other countries around the world.
A new version of the Android malware "Godfather" creates isolated virtual environments on mobile devices to steal account data and transactions from legitimate banking apps.
The phishing app uses the official banking app’s identifiers (e.g. logo legitimate-looking login screen) and even declares Google Play Store as the software source of the app.