Fireeye security inquiry team has just exposed a new type of Android malware which can not only copy the icons of common apps but can satirist the app interfaces of apps like Google Play Store, Facebook or WhatsApp.
The malware was first exposed in Denmark and has now made its way through a number of European countries together with Germany and Italy. There’s no verification whether it has even touched other parts of the world as well. Whatever the situation, all Android users are under danger from this malware.
The malware launches over your normal apps
According to the investigators, the malware is blowout using a very misleading and basic technique. The technique involves an SMS phishing system. When a user gets, what look like a genuine link, the malware is downloaded spontaneously and it starts to check which apps are vigorous and what is running in the back,
When a user opens an app which the malware was established to goal, it overlaps the app with a false user border. The interface is nearly alike to the original one including the documentation input pages. The virus then asks the user to input their particulars, which could contain all kind of personal material, and send it back to its server.
The malware could be your Facebook, Google Play Store, Uber, Viber, WeChat, WhatsApp or YouTube app
Meanwhile, the user keeps thinking they are fronting a totally true screen and what more resistant could they possibly need since the screen only exploded up after they threw the app.
The malware is intended to aim at least 8 dissimilar apps in total. The apps include Facebook, Google Play Store, WhatsApp Uber, Viber, WeChat, YouTube and a rare other.
What is scarier is the fact that the virus is being enhanced and extended to target even more popular apps. FireEye states “the spiteful apps used in later movements are often harder to analyze because confusion methods were adopted to avoid detection. There’s more, the malware is being upgraded to bypass “the SMS script constraint compulsory by the App Ops service (introduced in Android 4.3). All of this proposes that threat performers are actively refining their code.”
In accumulation to that, the people behind agenda this malware have been distributing more tempting links via SMS, One of these links achieved to get 130,000 clicks. Any link you click, even while surfing the web, could be a cause to this malware.