Again and again, so-called malware invades digital end devices. Users of a Android smartphones are now from one Trojan threatened, which above all could endanger the bank accounts of those affected.
This is how the Trojan gets onto the Android smartphone
Malware was already known in January that can access the bank data of users of Android smartphones. The new find also shows that this is not a unique phenomenon. The latest malware also makes users concerned about their security.
The Trojan called “Vulture” finds its way onto mobile devices via the Google Play Store. The malware hides behind the inconspicuous app 2FA Authenticator.
If you installed this 2-factor authenticator on your Android smartphone, you also got the virus for free. As Chip writes, the app was used as a so-called “Trojan dropper”. Cyber criminals use a seemingly harmless app to transfer the Trojan to an Android smartphone. Google recognized the problem in good time and removed the app from its Play Store on January 27, 2022.
cloak security
It is not surprising that the app uses a 2-factor authenticator as a pack mule for this purpose. More and more web service providers are converting their accounts to 2-factor authentication so that accounts remain secure.
The 2FA Authenticator app asks users for important data in order to set up such an authentication. For example, the application asks for biometric data of those affected, such as fingerprints. The authenticator requires extensive network access, such as disabling the screen lock and password.
Under the guise of security, the Trojan on the Android smartphone can disable the keyboard or use the biometric data sent to the app. In addition, the app should also be able to steal highly sensitive data such as the users’ bank details.
Although the app has already disappeared from the Google Play Store, there is still a risk that security apps could act as potential carriers of such malware. The fact is that such vulnerabilities in the Google Play Store are relatively rare. Downloading third-party authentication apps is usually far more risky.
Sources: Chip.de