STOCK MARKET

The return of the SharkBot Malware: Here’s how to protect yourself

The cryptocurrency market is proving to be an extremely lucrative opportunity for cybercriminals, who continue to devise new ways of stealing users’ funds. The latest is the case of the Sharkbot malware disguised as ‘Mister Phone Cleaner’ and ‘Kylhavy Mobile Security’ application is being distributed on the Google Play Store. In the past month alone, several malicious apps have been discovered on Google Play targeting users interested in investing in digital currencies.

Read More:-5 smart ways to save tax in FY2022-23

SharkBot malware targets financial and crypto applications, infecting user devices once they are installed. It steals cookies from accounts and bypasses authentication methods that require user input, such as fingerprints. This malware has been documented by malware analyst Alberto Segura on Twitter to alert Android users.

The reappearance of Sharkbot raises questions about whether more undetected malicious apps are lurking inside the Google Play store waiting to strike again.

Read More:-How sovereign gold bonds are taxed: A complete guide

What is SharkBot Malware?

SharkBot is a banking trojan that was first discovered in 2018. This malicious app was found targeting crypto apps, with a specific focus on those belonging to exchanges and trading services. The malware would steal the victim’s login information, allowing the hackers to use their account for malicious activities. SharkBot has since evolved and now uses advanced techniques to evade detection, making it a more sophisticated threat than before.

The malicious app was found to have been downloaded by over 100,000 users. The malware was disguised as apps for trading cryptocurrencies and exchanges, such as Poloniex and Bittrex. The apps were designed to trick users into granting them access to their login data.

Read More: Penalty For Not Wearing Seatbelt In Rear Seats: India to Come up With Guidelines Soon

The SharkBot malware first creates an account on the device using the victim’s name and email address. It then logs into the victim’s account on the targeted crypto exchange and attempts to steal their login data. The malware also attempts to steal the victim’s two-factor authentication code from their app. If the malware is successful, the hackers can use the victim’s account for malicious activities. In most cases, the malware is used to withdraw money from the account or buy more cryptocurrency.

Spotting the SharkBot malware

The malware is difficult to detect, so it’s best to be on the lookout for suspicious activity. Here are some warning signs that you might be infected.

Read More: Government seeks relaxation in public holding rules for IDBI Bank once privatised

If you notice unexpected withdrawals from your account, a sudden increase in your balance, or if you receive an email from your exchange with a password reset request that you didn’t initiate, it’s possible that your account was hacked. You can report suspicious activity to your exchange, but keep in mind that you might not get your money back. If you find that you are at risk of infection, you should take the following steps:

#Download apps from trusted sources. Only download apps from trusted sources. If you need to install an app from a source that you don’t trust, be sure to check the reviews and look for any signs of malicious activity.

Read More:-Road Safety: Top 5 lesser-known TRAFFIC rules in India that can get you CHALLANED

#Turn on automatic updates. All apps running on your Android device should be set up to receive automatic updates. This ensures that you have the latest version of the app, which often includes patches for security vulnerabilities.

#Install a mobile security solution. A reliable mobile security solution can identify malicious apps on your device and remove them. A security solution is your first line of defense against threats like the SharkBot malware.

Source :
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Most Popular

To Top