Android banking malware whitelists itself to stay connected with attackers

Android banking malware whitelists itself to stay connected with attackers

New Android.Fakebank.B variants use social engineering to bypass a battery-saving process and stay active in the background.

Twitter Card Style: 

summary

Recent variants of Android.Fakebank.B have been updated to work around the battery-saving process Doze. The variants display a pop-up message asking the user to add the threat to the Battery Optimizations exceptions whitelist.

read more

Source: Symantec

0Shares

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.