Banking malware that records keystrokes, makes phonecalls targets Android users
Svpeng infected 318,000 Android devices last November
Svpeng infected 318,000 Android devices last November
Svpeng infected 318,000 Android devices last November
A dangerous form of Android banking malware has received an alarming upgrade.
Svpeng - which steals a user's financial data - can now record keystrokes and take screenshots of smartphone activity, sending the information to cybercriminals.
맥스카지노It grants itself device administrator rights, draws itself over other apps, installs itself as a default SMS app, and grants itself some dynamic permissions that include the ability to send and receive SMS, make calls, and read contacts,맥스카지노 Kaspersky Lab senior malware analyst . 맥스카지노Furthermore, using its newly gained abilities, the Trojan can block any attempt to remove device administrator rights...preventing its uninstallation.맥스카지노
The was spotted in July on "malicious web sites" under the guise of a Flash Player.
Svpeng can embed itself into a smartphone's Accessibility Services feature, which helps disabled users navigate the device. 318,000 Androids were attacked by an earlier version, which gained access through Google Adsense advertisements.
The malicious software has been infecting devices since 2013, but the latest upgrade has only affected a small number of devices so far.
Here's how to avoid Svpeng:
1. Don't open files that you don't recognize.
2. Don't install apps from third-party sources.
3. Install updates as soon as they become available.
4. Use anti-virus software on all Android-based devices.