Beware Of This Malware That Steals Bank and Cryptocurrency Details

Be on guard from this moment as another Android malware called ‘Android.banker.A9480’ is reportedly targeting over 232 banking apps. The malware is designed by the evil one’s to steal personal data from users.

Similar to other banking malware, this one also sneaks into login data, SMS, contact lists and uploads them to a malicious server. Additionally, apart from the banking apps, this ‘Android.banker.A9480’ also targets cryptocurrency apps present on a user’s phone so that means that Cryptocurrency members are at risk as well.

Beware Of This Malware That Steals Bank and Cryptocurrency Details

Quick Heal Security Labs listed some of the Indian banking apps that are targeted by the Android banking Trojan malware which are;

  • Axis mobile
  • HDFC Bank MobileBanking
  • SBI Anywhere Personal
  • HDFC Bank MobileBanking LITE
  • iMobile by ICICI Bank
  • IDBI Bank GO Mobile+
  • Abhay by IDBI Bank Ltd
  • IDBI Bank GO Mobile
  • IDBI Bank mPassbook
  • Baroda mPassbook
  • Union Bank Mobile Banking
  • Union Bank Commercial Clients. 

According to Quick Heal, Android.banker.A9480 malware gets circulated via a fake Flash Player app on third-party stores. The Flash Player app is a popular target for cybercriminals due to its prevalence. Once users download the malicious application, they get several prompts to activate administrative rights. The app sends numerous pop-ups to victims until the administrative privileges are activated, the report added.

ALSO SEE:  Voguepay 3.0 now Accepts Bitcoin, QR code Payment and many More

HOW Android.banker.A9480 MALWARE OPERATES

Once the app is installed on a smartphone, the icon gets hidden when the user taps on it. The malicious app keeps working in the background while checking for one of the 232 banking apps. Further, if the app finds one of the targeted apps, it sends a fake notification that resembles the banking app. When users open the notification, they get a fake login window that is then used by the attackers to extract confidential data like login ID and password.

Also Read:How to Protect Yourself from Loapi Malware attack

As per the blog posted by Quick Heal, the malware can process commands like sending and collecting SMS, upload contact list and location, display fake notification, accessibility and GPS permission, and more. Since the malware can intercept incoming and outgoing SMS from an infected smartphone, it is also able to bypass the OTP based two-factor authentication on the user’s bank account.

ALSO SEE:  Arsenal FC Joins Cryptocurrency


Preventing is better than cure, that is to say that it’s more better not to download from untrusted source than to do whereas you have 50/50 chance of falling victim to this malware. For those that always download from third party sites, always be cautious of pop-ups you click OK. Always read before accepting.

Get Our Hottest Updates via SMS. Kindly SMS FOLLOW TUTORIALSCOPE to 40404 . On Any Network. To Submit Your Guest Post Or Sponsored Article, Enter HERE . Click HERE To Join Telegram Group
wizytechs blog-bg

Want more of this? Subscribe Below for Free

No spam guarantee.

Leave a Reply

Your email address will not be published. Required fields are marked *