Millions of Android users warned over FAKE lock screen that steals their phone’s PIN and raids bank accounts

Millions of Android users warned over FAKE lock screen that steals their phone’s PIN and raids bank accounts

\

MILLIONS of Android users are warned over a fake lock screen that steals their phone’s password and raids bank accounts.

Experts have issued warnings after an Android-specific banking virus was found to have new variants.

Experts have found a surge in dodgy bugs attempting to steal banking information on Android devices

3

Experts have found a surge in dodgy bugs attempting to steal banking information on Android devicesCredit: Getty

A staggering fourty new variants of the TrickMo Android banking trojan have been identified.

They have been designed specifically with the intent to steal Android pins, according to reports in Bleeping Computer.

Not all variants have entered variation yet but Trickmo was first documented in September 2019, its first known attack.

Key new features include interception of a one-time password, screen recording and more.

The malware tries to take advantage of a device’s powerful accessibility service permissions so that it can grant itself extra permissions and tap on prompts automatically.

The banking trojan then confronts affected users with phishing login screens to various banks in a bid to steal their credentials so attackers can perform unauthorised transactions.

Experts from US mobile security firm Zimperium have looked into the variants and noticed a dodgy new deceptive unlock screen.

It mimics the real Android unlock prompt and this is how they get their victims.

“The deceptive User Interface is an HTML page hosted on an external website and is displayed in full-screen mode on the device, making it look like a legitimate screen,” Zimperium reports.

Horror Android mistake lets crooks clone your bank card in seconds for spending spree – and even silently withdraw cash

They added: “When the user enters their unlock pattern or PIN, the page transmits the captured PIN or pattern details, along with a unique device identifier (the Android ID) to a PHP script.”

And stealing the PIN means cyber criminals can unlock the device when it’s not actively monitored to commit fraud – particularly late at night.

Zimperium found a whopping 13,000 victims known to be affected by the nasty malware.

Most were found in Canada but people in the UAE, Turkey, and Germany were also identified as victims.

Zimperium explained: “We discovered millions of records within these files, indicating the extensive number of compromised devices and the substantial amount of sensitive data accessed by the Threat Actor.”

The virus is spreading through phishing so to reduce the risk of falling victim, the experts say it’s best to avoid downloading apps on Google Play through SMS links or direct messages by people you don’t know.

Google Play Protect identifies and blocks known variants of TrickMo so it’s important to check it’s active and protecting your device.

A dodgy unlock system mimicking the Android version has been used by hackers

3

A dodgy unlock system mimicking the Android version has been used by hackersCredit: Zimperium
Victims have been found all over the world including in Canada and the UAE

3

Victims have been found all over the world including in Canada and the UAECredit: Zimperium

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply

Your email address will not be published. Required fields are marked *