Source |
CSO |
Identifiant |
1479525 |
Date de publication |
2019-11-21 03:11:00 (vue: 2019-11-21 13:00:04) |
Titre |
Emergent Android banking Trojan shows app overlay attacks are still effective |
Texte |
Researchers are tracking an Android Trojan that's been rapidly improving over the past several months. It uses overlay attacks to steal login credentials and payment card details from users of banking and other applications.
[ How well do you know these 9 types of malware and how to recognize them. | Sign up for CSO newsletters! ]
Dubbed Ginp, the Trojan was first spotted in October 2019, but has been in the wild since at least June, according to researchers from Dutch cybersecurity company ThreatFabric. During the past five months, the malware has received numerous improvements, including some features borrowed from an older commercial banking Trojan called Anubis. |
Envoyé |
Oui |
Condensat |
2019 according android anubis app applications are article attacks banking been borrowed but called card click commercial company credentials cso cybersecurity details dubbed during dutch effective emergent features first five from full ginp has here how improvements improving including june know least login malware months newsletters numerous october older other over overlay past payment please rapidly read received recognize researchers several shows sign since some spotted steal that them these threatfabric tracking trojan types users uses well wild |
Tags |
Malware
|
Stories |
|
Notes |
|
Move |
|