![]() ![]() The malware is distributed through fake Adobe flash player targeting device running on Android 7 and 8. Encrypts files on the external device and delete all the information on the infected device.Can send a text message to a specific number or to all the contacts in the device.Extract or delete text messages on the device.Steal contact information from the device.Making phone calls or forwarding phone calls to another number.The MysteryBot Banking Trojan is capable of The major difference from LokiBot malware is that attackers improved the commands and changed the name of the bot and panel to MysteryBot and also altered the network communication. This quickly brought us to an early conclusion that this newly discovered Malware is either an update to Lokibot, either another banking trojan developed by the same actor.” “During the investigation of its network activity, we found out that MysteryBot and LokiBot Android banker are both running on the same C&C server. The MysteryBot malware contains combined features of a banking trojan, ransomware, and keylogger making it more harmful than any other recently discovered malware. Security researchers at Threat Fabric who discovered the malware said the both MysteryBot and LokiBot malware were running on the same C&C server. Researchers discovered a new Android Banking Trojan dubbed MysteryBot which shares some similarities with the LokiBot malware. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |