Flubot Malware Targeting Users by Masquerading as Adobe Flash Player

This article has been indexed from

CySecurity News – Latest Information Security and Hacking Incidents

 

The Android malware FluBot has resurfaced again with new features. The banking Trojan is now tricking victims by posing as an Adobe Flash Player and luring users to download malicious software that steals data. 

The banking Trojan targeted Polish users via SMS asking them to click on a link to watch a video. Upon clicking on the link, users were redirected to a page offering a fake Flash Player APK that installs the FluBot malware on the Android device. Once installed, the malware can steal online banking credentials, send or intercept SMS messages (and one-time passwords), and capture screenshots.

The stolen data is then delivered to the malicious actors. As a second step, the malware uses the victims’ device to send new smishing messages to all of their contacts, and it usually spreads like wildfire. 

Anyone who receives suspicious texts or links asking them to load the flash player should simply ignore it, do not click any links that have been sent, and delete the messages instantly, researchers from Polish cybersecurity firm CSIRT KNF told while advising us

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

Read the original article: