Today, a worrying development has come up. According to research, Android pest Godfather, with its new version, targets bank applications in Türkiye.
According to the detailed news shared by Zimperium Android pests Godfather became much more dangerous after the update. According to the news, Malware used to steal user information by putting fake entry screens on financial applications. Now, instead of showing a fake screen, “virtualization” (virtualization) is used directly on the device. The process generally seems quite worrying; Because when the user tries to open the real banking application on his phone, the malware detects this process and initiates a specially prepared virtual application by producing a fake command. In other words, the user thinks that he has opened the real banking application; But in fact, a fake, virtual version is shown instead. All critical entry information is stolen through this version. In the above photo shared by Zimperium, the targeted banks and applications are revealed, while Godfather focuses on stealing lock identity information on users’ devices (lock -up pattern, PIN code or password). According to the statement, the malicious software does not try to predict the device lock; Instead, he uses a deceptive interface designed to convince the user to enter his identity information. These harmful android phones can be transmitted through many different applications. In this respect, the applications are very careful. In particular, non -Play Store loads reveal great risks.
You may be interested in
Yesterday, 16 billion user names and the password leaked news had made a lot of sound. According to experts, one of the biggest data leaks in history is before us. Speaking about the revealing more than one data set consisting of 16 billion user names and passwords in total, security experts said, “Stolen data provides an unprecedented resource for hackers, capturing accounts, identity theft and targeted identity attacks.” he said. It is stated that 30 different data sets containing input information have been discovered so far, while the data found does not consist of replicated copies of old leaks. In other words, the current login information is included in the data sets. It is recommended to change the passwords used to protect the risks caused by such leaks regularly. is being.