Connect with us
SharkBots new Android Trojan steals funds from bank and cryptocurrency SharkBots new Android Trojan steals funds from bank and cryptocurrency

Security

SharkBot’s new Android Trojan steals funds from bank and cryptocurrency accounts

Published

on

SharkBot initiates money transfers from compromised devices, bypassing multi-factor authentication mechanisms.

Cybersecurity Researchers at Cleafy told about a new Trojan for Android that uses accessibility features of devices to steal the credentials of banking and cryptocurrency services from users in Italy, the United Kingdom and the United States.

The malware, dubbed SharkBot, is designed to target a total of 27 services, including 22 unnamed international banks in Italy and the UK, as well as five cryptocurrency applications in the United States.

“The main goal of SharkBot is to initiate money transfers from compromised devices using an automatic transfer system, bypassing multi-factor authentication mechanisms. After the successful installation of SharkBot on the victim’s device, attackers can gain access to confidential banking information, credentials, personal information, current balance, etc., ”the experts explained.

The malware disguises itself as a media player, live video application or data recovery software. SharkBot repeatedly invites users to grant it permission to access confidential information through fraudulent pop-ups. The malware is also capable of using accessibility settings to launch ATS attacks, allowing operators to “automatically fill in fields in legitimate mobile banking applications and initiate money transfers from compromised devices to the accounts of the attackers’ money mules.”

This approach effectively eliminates the need to register a new device to perform fraudulent activities, and also allows you to bypass the two-factor authentication mechanisms established by banking applications.

Methods for evading malware detection include running emulator checks, encrypting C&C communications with a remote server, and hiding the app icon on the home screen after installation. No malware samples were found on the official Google Play store, indicating that it was installed via third-party downloads or social engineering schemes.

Click to comment

Leave a Reply

Your email address will not be published.

Security

In 2018, Google had an AI ready for a ChatGPT-style chatbot, but it was closed due to security issues.

Published

on

In 2018 Google had an AI ready for a ChatGPT style

In recent months, the ChatGPT chatbot has been on the news pages, and this has forced many companies to catch up with OpenAI. Among them are Microsoft, Google and a number of Chinese corporations. However, reportedly, the situation could be different.

In 2018, Google had an AI ready for a ChatGPT-style chatbot, but it was closed due to security issues.

Generated by the Midjourney neural network

As early as 2018, Google is said to have had a natural language processing AI similar to ChatGPT. However, company executives closed the project, considering it too dangerous. One of the developers was research engineer Daniel De Freitas, and Noam Shazeer, a software engineer at Google, also contributed to the project.

The project was called Meena and was a chatbot that could talk about different topics. With him you could discuss TV shows, have discussions about philosophy and joke. At the same time, the developers believed that this technology could be added to the search engine, however, in the end, Google stopped development. The company said the bot did not meet its AI security standards.

Note that later, on the basis of these developments, the LaMDA chat bot was created, which flies into the basis of Bard. Thus, the development nevertheless reached the mass user, albeit with a great delay.

Continue Reading

Phones

Two-way satellite communications and military-grade security. Presented smartphone Motorola Defy 2

Published

on

Two way satellite communications and military grade security Presented smartphone Motorola Defy

The British company Bullitt Group and Motorola, now owned by the Chinese Lenovo, introduced a new smartphone of the protected Motorola Defy series. The highlights of the Motorola Defy 2 are support for two-way satellite communication, combined with 5G fifth-generation cellular networks, and a very durable design.

Two-way satellite communications and military-grade security.  Presented smartphone Motorola Defy 2

The smartphone is resistant to dust, sand, dirt and water (IP68 and IP69K) and has been tested to military standard Mil-Spec 810H for extreme high and low temperatures, humid environments, salt fog, vibration and shock. The Motorola Defy 2 can be washed with soap and water and can also be cleaned with alcohol wipes.

The smartphone itself is equipped with a 6.6-inch Full HD + display with a refresh rate of 120 Hz, an 8 MP front camera, a main triple camera (50 MP, 8 and 2 MP), SoC MediaTek Dimensity 930, 6 GB of RAM and 128 GB flash memory that can be expanded with microSD cards, and a 5000 mAh battery with support for 15W charging and Qi wireless charging.

Two-way satellite communications and military-grade security.  Presented smartphone Motorola Defy 2

MediaTek Bullitt and 3GPP NTN technology, Bullitt satellite messaging service are supported. The smartphone is running Android 12 operating system, two major Android updates and 5 years of security updates are promised.

The Motorola Defy 2 smartphone will be available from Q2 2023 on select carriers in North America, Latin America and Canada starting at $599.

Continue Reading

Security

Hogwarts Legacy hacked and uploaded to torrent

Published

on

Hogwarts Legacy hacked and uploaded to torrent

Empress hacker hacked into Hogwarts Legacy and today posted it on a torrent – anyone can download the game. The ISO file is just over 88 GB.

Hogwarts Legacy hacked and uploaded to torrent

The Denuvo V17 provided protection for the Hogwarts Legacy, but it failed. Empress has previously said that it is going to hack the game, it also talked about creating some new technologies that would help bypass the protection of Hogwarts Legacy, and promised to “destroy” Denuvo. There are already over 80 comments on the torrent tracker, most thanks to Empress for the hack.

Continue Reading

Most Popular