• Thu. Dec 1st, 2022

New malware threatens mobile banking

ByCindy J. Daddario

Jul 16, 2022

One of the leading cybersecurity solution providers reports new Android banking malware, MaliBot.

Check Point Software Technologies’ latest Global Threat Index for June 2022 revealed that the new Android banking software MaliBot took third place among the most prevalent mobile malware after it emerged following the recent withdrawal of FluBot, another banking malware.

MaliBot disguises itself as cryptocurrency mining apps under different names and targets mobile banking users to steal financial information. Similar to FluBot, MaliBot uses phishing (smishing) text messages to trick victims into clicking on a malicious link that redirects them to download a fake app containing the malware.

Moreover, the notorious malware, Emotet, is still the most prevalent malware overall. Snake Keylogger comes in at number three after an increase in activity from eighth place last month. The main functionality of Snake is to log user keystrokes and transmit collected data to threat actors. While in May cybersecurity researchers saw Snake Keylogger being delivered via PDF files, it has recently spread via emails containing Word attachments labeled as request for quotes. Researchers also reported a new variant of Emotet in June that has credit card theft capabilities and targets Chrome browser users.

While it’s always good to see law enforcement succeed in bringing down cybercriminal groups or malware like FluBot, unfortunately, it didn’t take long for a new mobile malware to take its place. Cybercriminals are well aware of the central role mobile devices play in the lives of many people and are constantly adapting and improving their tactics accordingly. The threat landscape is rapidly changing and mobile malware poses a significant threat to personal and business security. Having a robust mobile threat prevention solution has never been more important.

Get the latest news


delivered to your inbox

Sign up for the Manila Times daily newsletters

By registering with an email address, I acknowledge that I have read and accept the terms of use and the privacy policy.

Checkpoint also revealed that “Apache Log4j Remote Code Execution” is the most commonly exploited vulnerability, affecting 43% of organizations worldwide, closely followed by “Web Server Exposed Git Repository Information Disclosure” which has an overall impact of 42. 3%. “Web Servers Malicious URL Directory Traversal” ranks third with an overall impact of 42.1%.