get your money here
//
var sc_project=10816873;
var sc_invisible=0;
var sc_security="9c4a5d3c";
var scJsHost = (("https:" ==
document.location.protocol) ? "https://secure." :
"http://www.");
document.write("
Friday, 19 February 2016
Must read:Xbot: This Android Malware Will Steal Your Banking Information
There are several Android malware and these programs are written by hackers for different purposes. While some are mere adware built specifically to bombard your device with unwanted ads, some are even more dangerous and they will spy on you to record and report your every move.
Just yesterday, we informed you about a new Android malware spreading through SMS but there’s a new one out there. Xbot is really dangerous as it steals your banking information and acts as a ransomware, locking down your device and forcing you to pay.
Fortunately, it’s not yet widespread as it is presently in Australia and Russia only but there are chances the attackers might want to expand operations to other regions. According to Palo Alto Researchers in a blog post on their website, the authors are putting a lot time and effort into making sure the Trojan becomes harder to detect. The researchers claim they’ve seen 22 applications come infected with Xbot but these are distributed directly from the developer’s server, not through the Play Store.
According to researchers at Palo Alto Networks:
“ While Android users running version 5.0 or later are so far protected from some of Xbot’s malicious behaviors, all users are vulnerable to at least some of its capabilities. As the author appears to be putting considerable time and effort into making this Trojan more complex and harder to detect, it’s likely that its ability to infect users and remain hidden will only grow, and that the attacker will expand its target base to other regions around the world.
Apart from stealing your information and sending it to Xbot’s C&C server, the device can lock you out of your device and force you to pay $100 though PayPal.
Subscribe to:
Post Comments (Atom)

No comments:
Post a Comment