[ad_1]
Regarding security issues, recently Zimperium through its official page reported that there is malware campaigns that occurs in Android devices, which devices will be infected with trojan horses and steal credentials recent Facebook user.
According to Zimperium, this threat has been active since 2018, and more generally targets comic and novel readers in Vietnam, Trojan Horses this itself is named “Schoolyard Bully” and is found in various applications that can be downloaded from the Google Play Store including third party apps with the same title.
So, more or less, for example, like in the picture above, where this application pretends to be an educational application with various books and topics for users to read, including Novels and Comics, but the real purpose of the application is to steal information such as:
- Name on Facebook profile
- Facebook ID
- Facebook email/phone number
- Facebook password
- Device name
- device APIs
- device RAM
This Trojan steals data by opening a fake Facebook login page and injecting malicious javascript code to get user input. And even then, this malware can evade antivirus programs and AI virus detections.
Worse, according to Zimperium, there were at least 300,000 victims from 71 countries, but the exact number of these countries was not reported because the malicious application was still found in third party app stores.
“Facebook reaches nearly 2.96 billion monthly users and continues to be the number one social media platform. As attackers leverage the Schoolyard Bully Trojan to gain unauthorized access to credentials, they have far more success accessing financial accounts. Nearly 64% of individuals use the same password that was exposed in a previous breach. With the percentage of users recycling passwords, it is no surprise the Schoolyard Bully Trojan has been active for years.said Zimperium
Now, Zimperium users remind that users should read reviews of the application before downloading and interacting interactively in it, and also make sure to pay attention request permissions requested by the application.
[ad_2]
Source link