#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

33.8 C
Dubai
Saturday, July 27, 2024
Cybercory Cybersecurity Magazine
HomeTopics 1Banking & Cybersecurity200,000 New Mobile Banking Trojan Installers Discovered: What You Need to Know

200,000 New Mobile Banking Trojan Installers Discovered: What You Need to Know

Date:

Related stories

North Korea Shifts Tactics: From Espionage to Ransomware

The cyber threat landscape is constantly evolving, with adversaries...

Cyber Insurance Gap: CrowdStrike Outage Highlights Coverage Shortfalls

The recent CrowdStrike outage, which impacted millions of Windows...

CrowdStrike Outage: A Case Study in Security Tool Oversight

On July 19th, 2024, a significant IT outage impacted...

Lurking in the Shadows: New Phishing Kit on Dark Web Targets Login Credentials

Phishing attacks remain a prevalent threat in the cybersecurity...
spot_imgspot_imgspot_imgspot_img

Mobile banking has become increasingly popular, with millions of people worldwide using their smartphones to manage their finances. However, with the convenience of mobile banking comes the risk of cyber threats. In a recent discovery, cybersecurity researchers have found nearly 200,000 new mobile banking Trojan installers, posing a significant threat to mobile banking users worldwide.

The discovery of nearly 200,000 new mobile banking Trojan installers was made by cybersecurity firm, Zimperium. These installers have been designed to deliver various malware strains, including banking Trojans, spyware, and ransomware. Once installed, these malware strains can steal sensitive financial and personal data, spy on the users, and even lock them out of their own device.

The Trojan installers were discovered on a popular app marketplace known as Aptoide, which is an alternative to the Google Play Store. Zimperium reported that the app marketplace was hosting multiple versions of these installers, indicating that they have been around for quite some time. The installers have been embedded in various legitimate-looking apps, such as gaming and utility apps, to trick users into installing them on their devices.

According to Zimperium, these Trojan installers were designed to target users in Southeast Asia, with Indonesia being the most affected country. However, given the global nature of mobile banking, users from other countries are also at risk of being targeted.

The discovery of these mobile banking Trojan installers highlights the importance of being vigilant when it comes to downloading and installing apps on mobile devices. Users should only download apps from trusted app marketplaces, such as the Google Play Store or Apple App Store, and avoid downloading apps from third-party app stores or unverified sources.

In addition, users should regularly update their mobile devices’ operating systems and security software to ensure they are protected against the latest threats. Users should also be cautious of phishing attacks and should avoid clicking on suspicious links or downloading attachments from unknown sources.

Conclusion:

The discovery of nearly 200,000 new mobile banking Trojan installers is a significant concern for mobile banking users worldwide. While the Trojans were designed to target users in Southeast Asia, users from other countries are also at risk. It is crucial that mobile device users remain vigilant when it comes to downloading and installing apps and take appropriate measures to protect their devices. Mobile banking users should only download apps from trusted app marketplaces, keep their operating systems and security software up-to-date, and avoid clicking on suspicious links or downloading attachments from unknown sources. By taking these precautions, users can reduce their risk of falling victim to mobile banking Trojans and other cyber threats.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here