New FakeBank variant intercepts phone calls to connect Android users to scammers
3 min read
A new variant of the infamous FakeBank Android malware has been discovered recently. This new FakeBank variant has the ability to intercept phone calls that victims are making to their banks where they are redirected to scammers instead.
As you probably know by now, FakeBank is a banking Trojan designed to show fake login screens on top of a legitimate banking app in an infected device. This Android malware has become one of the Android threats on the market that made its mark because of its creative way of executing its attack.
FakeBank has whitelisted its process in the past to remain active on the infected device while it goes into sleep mode. Aside from that, it also used TeamViewer to grant cyber crooks full access to the infected Android device. These tactics were both innovative at that time. However this new FakeBank variant is in a league of its own – according to security experts, even though this Android malware still behaves like a typical banking Trojan, it performs its attack with a twist.
During its attack, the new FakeBank variant intercepts phone call every time a user attempts to call a bank’s number. After that, it switches the dialed number to one that is preconfigured in its configuration file which leads users to scammers that will try to collect their banking credentials. In the same manner, developers of FakeBank can also call victims from a special number which is included in its configurations file where the malware – FakeBank will display the number as if the call is from the victim’s bank leading the victim to believe that the call is from his/her bank. This would allow the cyber crooks to carry out scams easily without having the victims suspect the call to be anything but suspicious.
At the time of writing, this new Android strain of malware is only active in South Korea according to the report made by the researchers from Symantec. In addition, security experts also found this Android malware inside 22 Android apps that are being distributed in third-party app stores using links that are shared over social media platforms. This only shows that the weakest point in the Android operating system is the installation process of apps where users really have to pay a closer look to what their apps are installing, from where as well as what permissions they are giving to these apps and whether the permissions asked are justified by its features. An ideal scenario would be is if users would limit installing apps from the official Google Play Store where they have to go through a malware scanning process before they can install the app.
Google has released its annual Android Security Report which reveals that it still scans over 50 billion apps each day with the goal of finding malicious apps.
“In 2017, downloading a [potentially harmful application] from Google Play was less likely than the odds of an asteroid hitting the earth,” Google stated.
One Click Root Author
One Click Root Author
Content Writer
Experienced writer covering technology and mobile development.
You Might Also Like
Android Device
Android 14 Root Methods: What Changed?
Explore the new root methods and security changes in Android 14.
Android Device
Latest Android Security Updates Impact Root Access
Understanding how the latest security patches affect root methods.
Android Device
Google Pixel 8 Pro Root Guide Released
Complete step-by-step guide to rooting the Google Pixel 8 Pro.
Comments
JD
John Doe
2 days ago
Great article! Very informative and well-written. Thanks for sharing.
JS
Jane Smith
5 days ago
I found the security section particularly helpful. Looking forward to more content like this!
Leave a Comment
Newsletter
Get the latest tech news delivered to your inbox weekly.
Popular Posts
-
1
Getting Started with Android Development
12.5K views
-
2
Best Practices for Mobile Security
8.2K views
-
3
Understanding Smartphone Hardware
6.8K views