Watch out – that Android security update may be malware

The creators of FluBot have introduced a new marketing campaign that makes use of pretend Android security update warnings to trick probable victims into setting up the malware on their devices.

In a new site submit, New Zealand’s personal computer crisis reaction group Cert NZ has warned customers that the message on the malware’s new set up web page is truly a lure designed to instill a feeling of urgency that methods customers into setting up FluBot on their very own devices.

The new FluBot set up web page, that customers are led to after acquiring pretend messages about pending or skipped package deal deliveries or even stolen photographs uploaded on line, informs them that their devices are contaminated with FluBot which is a type of Android adware utilised to steal economical login and password information from their devices. Even so, by setting up a new security update, they can clear away FluBot from their Android smartphone.

The web page also goes a move further by instructing customers to permit the set up of applications from unfamiliar resources on their system. By executing so, the cybercriminals’ pretend security update can be mounted on their system and though a consumer may possibly assume they have taken action to secure versus FluBot, they have truly mounted the malware on their smartphone them selves.

Switching methods

Until a short while ago, FluBot was spread to Android smartphones by means of spam text messages utilizing contacts stolen from devices that have been now contaminated with the malware. These messages would instruct probable victims to install applications on their devices in the type of APKs that have been shipped by attacker-controlled servers.

Once FluBot has been mounted on a user’s system, the malware frequently attempts to trick victims into providing it further permissions as nicely as granting obtain to the Android Accessibility service that will allow it to operate in the qualifications and execute other destructive tasks.

FluBot is capable of stealing a user’s payment and banking details by utilizing overlay attacks exactly where an overlay is put on best of reputable banking, payment and cryptocurrency applications. As pointed out prior to, the malware will also steal a user’s contacts to deliver them phishing messages to assist spread FluBot even further.

Though FluBot was largely utilised to concentrate on customers in Spain at its onset, its operators have due to the fact expanded the marketing campaign to concentrate on further international locations in Europe together with Germany, Poland, Hungary, Uk and Switzerland as nicely as Australia and Japan in modern months.

Via BleepingComputer