The return of the SharkBot Malware: Here's how to protect yourself – The Indian Express

The cryptocurrency market is proving to be an extremely lucrative opportunity for cybercriminals, who continue to devise new ways of stealing users’ funds. The latest is the case of the Sharkbot malware disguised as ‘Mister Phone Cleaner’ and ‘Kylhavy Mobile Security’ application is being distributed on the Google Play Store. In the past month alone, several malicious apps have been discovered on Google Play targeting users interested in investing in digital currencies.
SharkBot malware targets financial and crypto applications, infecting user devices once they are installed. It steals cookies from accounts and bypasses authentication methods that require user input, such as fingerprints. This malware has been documented by malware analyst Alberto Segura on Twitter to alert Android users.
The reappearance of Sharkbot raises questions about whether more undetected malicious apps are lurking inside the Google Play store waiting to strike again.
SharkBot is a banking trojan that was first discovered in 2018. This malicious app was found targeting crypto apps, with a specific focus on those belonging to exchanges and trading services. The malware would steal the victim’s login information, allowing the hackers to use their account for malicious activities. SharkBot has since evolved and now uses advanced techniques to evade detection, making it a more sophisticated threat than before.
The malicious app was found to have been downloaded by over 100,000 users. The malware was disguised as apps for trading cryptocurrencies and exchanges, such as Poloniex and Bittrex. The apps were designed to trick users into granting them access to their login data.
The SharkBot malware first creates an account on the device using the victim’s name and email address. It then logs into the victim’s account on the targeted crypto exchange and attempts to steal their login data. The malware also attempts to steal the victim’s two-factor authentication code from their app. If the malware is successful, the hackers can use the victim’s account for malicious activities. In most cases, the malware is used to withdraw money from the account or buy more cryptocurrency.
The malware is difficult to detect, so it’s best to be on the lookout for suspicious activity. Here are some warning signs that you might be infected.
If you notice unexpected withdrawals from your account, a sudden increase in your balance, or if you receive an email from your exchange with a password reset request that you didn’t initiate, it’s possible that your account was hacked. You can report suspicious activity to your exchange, but keep in mind that you might not get your money back. If you find that you are at risk of infection, you should take the following steps:
#Download apps from trusted sources. Only download apps from trusted sources. If you need to install an app from a source that you don’t trust, be sure to check the reviews and look for any signs of malicious activity. •
#Turn on automatic updates. All apps running on your Android device should be set up to receive automatic updates. This ensures that you have the latest version of the app, which often includes patches for security vulnerabilities. •
#Install a mobile security solution. A reliable mobile security solution can identify malicious apps on your device and remove them. A security solution is your first line of defense against threats like the SharkBot malware.
Why Amit Shah’s Mumbai visit is so significant for BJP


Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.