Android Trojan Targets 400 Crypto and Finance Apps
Posted On 22/12/2022
[ad_1]
Users of popular banking and cryptocurrency apps for Android mobile devices should exercise extreme caution, warns Group-IB, cybersecurity
Cybersecurity
Cybersecurity is a blanket term that refers to the protection of computer systems and networks from the theft.More broadly speaking, cybersecurity can also represent countermeasures against damage to hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.It was not long ago that the term cybersecurity not exist as it was first used in 1989. In today’s vernacular cybersecurity, refers to measures taken to protect a computer or computer system or a network against hacking or unauthorized access. Why Cybersecurity MattersCybersecurity is a huge concern for individuals given our reliance on computers, laptops, smart phones, the Internet, etc.These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money from users, or interrupting normal business processes. Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative. In the modern world, with every person and business connected, everyone benefits from advanced cyber-defense programs. At an individual level, a cybersecurity attack can result in everything from identity theft, to extortion attempts, to the loss of essential data like family photos. Everyone relies on critical infrastructures like power plants, hospitals, and financial service companies. Securing these and other organizations is vital to keeping our society functioning. Significant sources of cybersecurity threats include phishing, ransomware, malware, and social engineering, among others.With the rise of cryptocurrencies over the past decade, cybersecurity has also reached even greater importance a safeguard against abuse.
Cybersecurity is a blanket term that refers to the protection of computer systems and networks from the theft.More broadly speaking, cybersecurity can also represent countermeasures against damage to hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.It was not long ago that the term cybersecurity not exist as it was first used in 1989. In today’s vernacular cybersecurity, refers to measures taken to protect a computer or computer system or a network against hacking or unauthorized access. Why Cybersecurity MattersCybersecurity is a huge concern for individuals given our reliance on computers, laptops, smart phones, the Internet, etc.These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money from users, or interrupting normal business processes. Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative. In the modern world, with every person and business connected, everyone benefits from advanced cyber-defense programs. At an individual level, a cybersecurity attack can result in everything from identity theft, to extortion attempts, to the loss of essential data like family photos. Everyone relies on critical infrastructures like power plants, hospitals, and financial service companies. Securing these and other organizations is vital to keeping our society functioning. Significant sources of cybersecurity threats include phishing, ransomware, malware, and social engineering, among others.With the rise of cryptocurrencies over the past decade, cybersecurity has also reached even greater importance a safeguard against abuse. Read this Term services provider. The GodFather, an Android banking trojan, has already infected over 400 apps worldwide.
The software is currently attacking users in 16 different countries. Confirmed infections include 215 banking apps, 94 cryptocurrency wallets, and 110 crypto exchange platforms. The most documented cases of trojan activity were discovered in the United States, Turkey, Spain, Canada, France, Germany and the UK.
The trojan displays fake versions of popular financial and cryptocurrency applications on infected mobile devices. Unaware users provide fraudsters with sensitive personal data and face a heightened risk of losing their funds. In addition, GodFather allows hackers to record the screen of the victim’s device, launch keyloggers, send SMS from an infected smartphone or tablet and bypass two-factor authentication.
“The emergence of Godfather underscores the ability of threat actors to edit and update their tools to maintain their effectiveness in spite of efforts by malware detection and prevention providers to update their products. Malicious actors can return to the source code, update out-of-date malware types, and in many ways make them even more dangerous. With a tool like Godfather, threat actors are limited only by their ability to create convincing web fakes for a particular application,” Artem Grischenko, Junior Malware Analyst at Group-IB, commented.
According to the Group-IB findings, the malware code has interesting functionality that prevents it from attacking users from Russian-speaking and former Soviet Union countries. It may suggest that the creators of GodFather are from Russia or one of the ex-Soviet states.
Crypto Hackers Stole $3b in 2022
Although the price of popular cryptos is falling this year, the digital assets industry is still extremely popular among hackers. According to Chainalysis, the blockchain
Blockchain
Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned.) In this sense, blockchain is immune to the manipulation of data making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tamper with. The Evolution of BlockchainBlockchain was originally invented by an individual or group of people under the name of Satoshi Nakamoto in 2008. The purpose of blockchain was originally to serve as the public transaction ledger of Bitcoin, the world’s first cryptocurrency.In particular, bundles of transaction data, called “blocks”, are added to the ledger in a chronological fashion, forming a “chain.” These blocks include things like date, time, dollar amount, and (in some cases) the public addresses of the sender and the receiver.The computers responsible for upholding a blockchain network are called “nodes.” These nodes carry out the duties necessary to confirm the transactions and add them to the ledger. In exchange for their work, the nodes receive rewards in the form of crypto tokens.By storing data via a peer-to-peer network (P2P), blockchain controls for a wide range of risks that are traditionally inherent with data being held centrally.Of note, P2P blockchain networks lack centralized points of vulnerability. Consequently, hackers cannot exploit these networks via normalized means nor does the network possess a central failure point.In order to hack or alter a blockchain’s ledger, more than half of the nodes must be compromised. Looking ahead, blockchain technology is an area of extensive research across multiple industries, including financial services and payments, among others.
Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned.) In this sense, blockchain is immune to the manipulation of data making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tamper with. The Evolution of BlockchainBlockchain was originally invented by an individual or group of people under the name of Satoshi Nakamoto in 2008. The purpose of blockchain was originally to serve as the public transaction ledger of Bitcoin, the world’s first cryptocurrency.In particular, bundles of transaction data, called “blocks”, are added to the ledger in a chronological fashion, forming a “chain.” These blocks include things like date, time, dollar amount, and (in some cases) the public addresses of the sender and the receiver.The computers responsible for upholding a blockchain network are called “nodes.” These nodes carry out the duties necessary to confirm the transactions and add them to the ledger. In exchange for their work, the nodes receive rewards in the form of crypto tokens.By storing data via a peer-to-peer network (P2P), blockchain controls for a wide range of risks that are traditionally inherent with data being held centrally.Of note, P2P blockchain networks lack centralized points of vulnerability. Consequently, hackers cannot exploit these networks via normalized means nor does the network possess a central failure point.In order to hack or alter a blockchain’s ledger, more than half of the nodes must be compromised. Looking ahead, blockchain technology is an area of extensive research across multiple industries, including financial services and payments, among others. Read this Term analytics company, traders and investors have lost over $3 billion to bad actors in 2022.
The largest attack in 2022 took place in March when more than $620 million in USDC and ETH was stolen from Ronin Network. Meanwhile, another hacker exploited a bug in the Wormhole protocol in February and stole $320 million in wrapped ETH.
Users of popular banking and cryptocurrency apps for Android mobile devices should exercise extreme caution, warns Group-IB, cybersecurity
Cybersecurity
Cybersecurity is a blanket term that refers to the protection of computer systems and networks from the theft.More broadly speaking, cybersecurity can also represent countermeasures against damage to hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.It was not long ago that the term cybersecurity not exist as it was first used in 1989. In today’s vernacular cybersecurity, refers to measures taken to protect a computer or computer system or a network against hacking or unauthorized access. Why Cybersecurity MattersCybersecurity is a huge concern for individuals given our reliance on computers, laptops, smart phones, the Internet, etc.These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money from users, or interrupting normal business processes. Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative. In the modern world, with every person and business connected, everyone benefits from advanced cyber-defense programs. At an individual level, a cybersecurity attack can result in everything from identity theft, to extortion attempts, to the loss of essential data like family photos. Everyone relies on critical infrastructures like power plants, hospitals, and financial service companies. Securing these and other organizations is vital to keeping our society functioning. Significant sources of cybersecurity threats include phishing, ransomware, malware, and social engineering, among others.With the rise of cryptocurrencies over the past decade, cybersecurity has also reached even greater importance a safeguard against abuse.
Cybersecurity is a blanket term that refers to the protection of computer systems and networks from the theft.More broadly speaking, cybersecurity can also represent countermeasures against damage to hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.It was not long ago that the term cybersecurity not exist as it was first used in 1989. In today’s vernacular cybersecurity, refers to measures taken to protect a computer or computer system or a network against hacking or unauthorized access. Why Cybersecurity MattersCybersecurity is a huge concern for individuals given our reliance on computers, laptops, smart phones, the Internet, etc.These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money from users, or interrupting normal business processes. Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative. In the modern world, with every person and business connected, everyone benefits from advanced cyber-defense programs. At an individual level, a cybersecurity attack can result in everything from identity theft, to extortion attempts, to the loss of essential data like family photos. Everyone relies on critical infrastructures like power plants, hospitals, and financial service companies. Securing these and other organizations is vital to keeping our society functioning. Significant sources of cybersecurity threats include phishing, ransomware, malware, and social engineering, among others.With the rise of cryptocurrencies over the past decade, cybersecurity has also reached even greater importance a safeguard against abuse. Read this Term services provider. The GodFather, an Android banking trojan, has already infected over 400 apps worldwide.
The software is currently attacking users in 16 different countries. Confirmed infections include 215 banking apps, 94 cryptocurrency wallets, and 110 crypto exchange platforms. The most documented cases of trojan activity were discovered in the United States, Turkey, Spain, Canada, France, Germany and the UK.
The trojan displays fake versions of popular financial and cryptocurrency applications on infected mobile devices. Unaware users provide fraudsters with sensitive personal data and face a heightened risk of losing their funds. In addition, GodFather allows hackers to record the screen of the victim’s device, launch keyloggers, send SMS from an infected smartphone or tablet and bypass two-factor authentication.
“The emergence of Godfather underscores the ability of threat actors to edit and update their tools to maintain their effectiveness in spite of efforts by malware detection and prevention providers to update their products. Malicious actors can return to the source code, update out-of-date malware types, and in many ways make them even more dangerous. With a tool like Godfather, threat actors are limited only by their ability to create convincing web fakes for a particular application,” Artem Grischenko, Junior Malware Analyst at Group-IB, commented.
According to the Group-IB findings, the malware code has interesting functionality that prevents it from attacking users from Russian-speaking and former Soviet Union countries. It may suggest that the creators of GodFather are from Russia or one of the ex-Soviet states.
Crypto Hackers Stole $3b in 2022
Although the price of popular cryptos is falling this year, the digital assets industry is still extremely popular among hackers. According to Chainalysis, the blockchain
Blockchain
Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned.) In this sense, blockchain is immune to the manipulation of data making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tamper with. The Evolution of BlockchainBlockchain was originally invented by an individual or group of people under the name of Satoshi Nakamoto in 2008. The purpose of blockchain was originally to serve as the public transaction ledger of Bitcoin, the world’s first cryptocurrency.In particular, bundles of transaction data, called “blocks”, are added to the ledger in a chronological fashion, forming a “chain.” These blocks include things like date, time, dollar amount, and (in some cases) the public addresses of the sender and the receiver.The computers responsible for upholding a blockchain network are called “nodes.” These nodes carry out the duties necessary to confirm the transactions and add them to the ledger. In exchange for their work, the nodes receive rewards in the form of crypto tokens.By storing data via a peer-to-peer network (P2P), blockchain controls for a wide range of risks that are traditionally inherent with data being held centrally.Of note, P2P blockchain networks lack centralized points of vulnerability. Consequently, hackers cannot exploit these networks via normalized means nor does the network possess a central failure point.In order to hack or alter a blockchain’s ledger, more than half of the nodes must be compromised. Looking ahead, blockchain technology is an area of extensive research across multiple industries, including financial services and payments, among others.
Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned.) In this sense, blockchain is immune to the manipulation of data making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tamper with. The Evolution of BlockchainBlockchain was originally invented by an individual or group of people under the name of Satoshi Nakamoto in 2008. The purpose of blockchain was originally to serve as the public transaction ledger of Bitcoin, the world’s first cryptocurrency.In particular, bundles of transaction data, called “blocks”, are added to the ledger in a chronological fashion, forming a “chain.” These blocks include things like date, time, dollar amount, and (in some cases) the public addresses of the sender and the receiver.The computers responsible for upholding a blockchain network are called “nodes.” These nodes carry out the duties necessary to confirm the transactions and add them to the ledger. In exchange for their work, the nodes receive rewards in the form of crypto tokens.By storing data via a peer-to-peer network (P2P), blockchain controls for a wide range of risks that are traditionally inherent with data being held centrally.Of note, P2P blockchain networks lack centralized points of vulnerability. Consequently, hackers cannot exploit these networks via normalized means nor does the network possess a central failure point.In order to hack or alter a blockchain’s ledger, more than half of the nodes must be compromised. Looking ahead, blockchain technology is an area of extensive research across multiple industries, including financial services and payments, among others. Read this Term analytics company, traders and investors have lost over $3 billion to bad actors in 2022.
The largest attack in 2022 took place in March when more than $620 million in USDC and ETH was stolen from Ronin Network. Meanwhile, another hacker exploited a bug in the Wormhole protocol in February and stole $320 million in wrapped ETH.