Only appearing a month ago, MaliBot has already established itself as one of the most common malware strains that targets Android users.

One of the most pervasive risks to Android users has recently been a potent banking malware that was recently found.

MaliBot, first discovered in June, bypasses multi-factor authentication security measures to steal from users their passwords, bank account information, and the contents of their cryptocurrency wallets. On compromised Android devices, the malware can also access text messages, steal cookies from online browsers, and grab screenshots.

MaliBot may also send out harmful SMS messages to other users, using a strategy akin to the one that made the FluBot malware so popular before it was eliminated by concerted law enforcement activity in May.

After first emerging only a few weeks ago, MaliBot has now grown to be one of the most widespread types of Android malware. It filled the void left by FluBot as the third-most common malware attacking Android users in June, according to cybersecurity experts at Check Point.

While it’s always encouraging to see law enforcement take down cybercrime organisations or malware like FluBot, tragically it didn’t take long for a new mobile malware to replace it, according to Maya Horowitz, Check Point Software’s VP of research.

AlienBot, a family of malware-as-a-service that enables remote attackers to inject malicious code into legitimate financial apps, was the Android malware that Check Point discovered the most frequently in June before MaliBot. This malware allowed remote attackers to access sensitive data in accounts and eventually gain total control of the device.

Anubis, a banking trojan that was first discovered in 2016 and is still a concern, was the second-most prevalent Android malware for the month.

Anubis’ developers are constantly adding new capabilities to the malware, and in addition to being a banking trojan, it now incorporates remote access trojan functionality and keylogging capabilities. It can also record audio from the Android device that is infected. It is frequently disseminated and concealed within harmful applications.

“Cybercriminals constantly modify and enhance their strategies in order to fit the key position those mobile devices play in the lives of many individuals. Mobile malware poses a serious threat to both personal and business security as the threat landscape is rapidly changing “Horowitz stated.

A large amount of personally identifiable information on mobile devices makes them an alluring target for cybercriminals, and many users aren’t completely aware that their smartphone is something that might be infected with malware.

Users should be wary of any unexpected text messages that ask them to click a link because this is a typical method for spreading mobile malware. In recent years, messages claiming that you missed a delivery and requesting that you click a link to reschedule it have become a typical threat.

Users should download programmes from reputable stores like the Google Play Store in order to be safe. Malware can occasionally evade Play Store safeguards and hide among apps that seem legitimate. When downloading new apps from developers who just provide the bare minimum of information, users should exercise caution because this could mean that the programme is a burner profile for spreading malware.

Users should also pay attention to reviews because many negative ones may indicate that a programme is malicious or not functioning as promised.

Reference : https://www.zdnet.com/article/android-security-how-this-new-malware-has-become-a-top-smartphone-threat/?web_view=true