Tag Archive for: Steal

Beware! This Android Malware Can Steal All Your Money While Remaining Undetected


Online threats manifest in various forms and sizes, ranging from deceptive job offers by scammers to phishing emails that install harmful software on your device. However, imagine encountering a new malware specifically designed for Android devices, disguising itself as legitimate apps like Google Chrome. This infamous malware, known as ‘Chameleon,’ not only infiltrates your device’s security measures but also steals sensitive financial data, including bank account passwords. The threat posed by it is significant and warrants caution.

The latest information on this comes from research conducted by ThreatFabric. It states that this threat isn’t new; it has been circulating for a year or so. However, recently, bad actors have made it more advanced than before, allowing it to easily penetrate devices using an HTML trick capable of granting access to a user’s important information.

Story continues below advertisement

The research further notes that this malware is distributed through Zombinder, allowing it to stick around undetected as you use your typical everyday apps like Google Chrome. It can also easily bypass your device’s biometrics, as noted by ThreatFabric.

As we mentioned, this malware can steal personal data. It can also use this data to gain access to your bank account, causing financial loss and allowing bad actors to access your personal information. So, unless you want to lose all your money and even your digital existence, be quite wary.

How to Be Safe

The one and only way to truly avoid having malware like Chameleon on your device is to stop downloading apps and APKs from random websites, and especially the ones that promise a paid app for free. Downloading from unverified sources can prove to be quite challenging in the long term, and it can do more harm than good. Ergo, never download any official app from a random link that you received, or a website that looks fishy.

Another way to ensure safety is to keep Google’s Play Protect on. This built-in Google tool can go a long way to ensure the safety of your device.

top videos

  • Apple Watch BANNED In US: All Details About The Masimo Patent War | Tech | Latest News

  • ChatGPT rival Krutrim Launched By Ola: What is…

  • Source…

    Beware: North Korean Hackers Allegedly Have New Modus Operandi To Steal Your Crypto


    KEY POINTS

    • Rogue actors allegedly backed by North Korea have stolen data from nearly 1,500 victims between March and October
    • The majority of the victims are from the private sector and 57 from incumbent or retired government officials
    • When the scam email was opened or the phishing link was clicked on, the victim’s computer would be infected with malware

    The South Korean National Police Agency has warned people against North Korean malicious actors and hackers, who have been impersonating government agency officials and journalists to steal cryptocurrencies.

    Rogue actors allegedly backed by the hermit country have stolen data from nearly 1,500 victims between March and October, the majority of whom were from the private sector and 57 from incumbent or retired government officials, the local media reported quoting the South Korean National Police Agency.

    Malicious actors pretended to be officials from South Korea’s National Pension Service, National Health Insurance, National Tax Service and National Police Agency to send phishing emails to recipients.

    When the scam email was opened or the phishing link was clicked on, the victim’s computer would be infected with malware, following which the hackers would harvest data, including personal information.

    Hackers also stole user IDs and profiles of 19 victims to access their cryptocurrency trading accounts, according to the police authorities, although they did not disclose the amount of crypto assets stolen by cybercriminals.

    North Korea’s hacking efforts have grown in scale and scope in 2023, according to authorities who revealed that “last year, they stripped virtual assets by distributing ransomware. That coerced victims to pay money and valuables to regain their property. ” However, this year, malicious actors have become more aggressive in phishing, which has resulted in the authorities shutting down 42 phishing websites.

    It was reported earlier this month that North Korean hackers linked to the notorious cybercriminal group Lazarus Group, purportedly operating on behalf of North Korea, were impersonating blockchain engineers on Discord using social engineering techniques.

    Victims reportedly download a malicious ZIP file, convinced they were…

    Source…

    How hackers fake”404” error page to steal sensitive data


    Hackers are faking 404 error pages of online retailer’s websites to hide malicious codes and steal customer’s credit card information. 

    Hackers are faking 404 error pages of online retailer’s websites to hide malicious codes and steal customer’s credit card information. 
    | Photo Credit: Reuters

    Hackers are faking 404 error pages of online retailer’s websites to hide malicious codes and steal customer’s credit card information. These attacks are part of a variant observed by researchers of Akamai Security Intelligence Group. Other attacks methods include concealing code in the HTML image tag’s “onerror” and an image binary to make it appear as the Meta Pixel code snippet, Bleeping Computer reported.

    While the campaign is mainly targeted at Magento and WooCommerce sites, hackers are also targeting renowned organizations in the food and retail sectors, the report said.

    Analysis by security researchers found that the hackers behind the campaign have altered the default error page for websites to hide malicious code. The code displays a fake form that the website visitors are expected to fill out with sensitive details including their credit card number, expiration data, and security code.

    Once victims share the data on the bogus form, they get a fake “session timeout” error. Meanwhile, the information shared by them is sent to the hacker via an image request URL carrying the string as a query parameter. This helps the attackers evade detection by network monitoring tools, as the request looks like a benign image fetch event.

    (For top technology news of the day, subscribe to our tech newsletter Today’s Cache)

    While hackers have targeted online stores in the past to steal sensitive user information, the idea of manipulating error pages and the concealment technique is “highly innovative” and something that hasn’t been seen in the past, read Akamai’s report.

    The report further along with the methods used in the campaign reinforces the fact that web skimming techniques are constantly evolving, and are becoming more sophisticated, which makes detection and mitigation more complicated.

    Source…