0.6 C
Munich

Banks alert customers about mobile banking malware targeting over 200 apps

Must read

[ad_1]

Several Indian have alerted their customers not to download apps from any source other than official app stores. Banking customers are being targeted by a new type of campaign using SOVA Android Trojan.

This captures the credentials when users log onto their net-banking apps and access bank accounts. The new version of SOVA appears to be targeting more than 200 mobile applications, including banking apps and crypto wallets.

A number of — including HDFC Bank, IDBI Bank, and — have informed their customers or are in the process of issuing advisory regarding the .

“CERT-in has already issued an advisory to and we have suggested several steps, too, to stay protected,” said Sameer Ratolikar, chief information security officer, .

“We have advised users not to download apps from third-party websites, regularly update their Android devices with the latest patches, and avoid visiting untrusted websites/clicking suspicious links,” Ratolikar told Business Standard, adding that has initiated an in-depth awareness campaign for its customers.

The malware is distributed via smishing (phishing via SMS) attacks.

Once the fake android app is installed on a mobile phone, it sends/ captures the list of all applications installed on the device and targets specific financial applications.

While asking customers to download applications from official app stores, such as device manufacturer’s or operating system app store, banks are advising them that before downloading or installing apps on android devices, even from Google Play, to always review app details, the number of downloads, user reviews, comments, and additional information section.

“The malware is capable of collecting keystrokes, stealing cookies, intercepting multi-factor authentication (MFA) tokens, taking screenshots and recording video from a webcam, performing gestures like screen click, swipe, etc, using android accessibility service, copy/paste, and even mimicking over 200 banking and payment applications. The malware also has the capability to encrypt all data on an android phone and hold it to ransom,” a public sector bank said in an advisory to the banks.

asked its customers not to browse untrusted websites or follow untrusted links and exercise caution while clicking on the link provided in any unsolicited e-mails and SMSs.

“Look for suspicious numbers that don’t look like real mobile phone numbers. Scammers often mask their identity by using email-to-text services to avoid revealing their actual phone number. Genuine SMS messages received from banks usually contain sender id (consisting of bank’s short name) instead of a phone number in the sender information field,” said.

Banks have advised that customers should report any unusual activity in their account immediately to the respective bank with the relevant details for taking further appropriate actions, while asking them to install and maintain updated anti-virus and antispyware software.

[ad_2]

Source link

- Advertisement -spot_img

More articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisement -spot_img

Latest article