Image Source: https://myzol.co.zw/Data/Articles/1290/androidsecurity__zoom.jpg
If you are using banking apps on your android mobile phone, you need to read on further. An Android Banking Trojan called Flash Player (Android.banker.A9480) has affected over 232 banking apps, many of which are mobile apps of prominent Indian public as well as private banks.
Android mobile phone users having third party app stores like Mobogenie, Getjar, SlideMe – an online app market to install apps, just like Google Play but not owned by Android OS or Google – run the risk of accidentally downloading this malware, putting confidential security details like netbanking customer id and password at risk. Links to download this can also come through spam emails or SMS.
The malware targets through a simple but hideous process: it enters your mobile phone through a fake Flash Player. It’s striking similarity to Adobe Flash can trick people into downloading it. Once installed, you have no option but to give this app the administrative rights as the malware will keep on popping up until you allow it to access your mobile phone details. The app is capable of automatically hiding in the background and keeps track of all activities on your mobile device.
In a report published on Quickheal Security Labs, the Android.banker.A9480 malware gets circulated via a fake Flash Player app can affect as many as 232 banking as well as cryptocurrency apps world over. As soon as it tracks activity on any of these targeted apps, the Trojan generates fake notification on your mobile screen asking confidential security details. If the Flash Player malware detects a banking app, it seeks your customer id and password details through a fake login window that is then used by the attackers to extract confidential data like login ID and password. Also, this malware can process commands like sending and collecting SMS, uploading contact list and location, displaying fake notifications, accessibility and GPS permission, and more. Since this malware can intercept incoming and outgoing SMS from an infected smartphone, it’s also capable of bypassing the OTP based two-factor authentication on the user’s bank account.
Quick Heal lists the Indian banking apps that are targeted by the Android banking Trojan malware viz:
- Axis mobile
- HDFC Bank MobileBanking
- SBI Anywhere Personal
- HDFC Bank MobileBanking LITE
- iMobile by ICICI Bank
- IDBI Bank GO Mobile+
- Abhay by IDBI Bank Ltd
- IDBI Bank GO Mobile
- IDBI Bank mPassbook
- Baroda mPassbook
- Union Bank Mobile Banking
- Union Bank Commercial Clients.
These are some of the list of apps available for mobile banking on android phones which can get affected as soon as the malware is into your android smartphone. Till then malware is not cured remove any third party app store from your phone and try downloading apps from google play store only.