Gevaarlijke Android-malware duikt op in valse Track & Trace-app van 'DHL'

Dangerous Android Malware Appears in “DHL” Fake Tracking & Tracking App – Scammed ?!

FluBot, a dangerous malware targeting Android users, appeared in the fake Track & Trace app of the company identity of the DHL courier service. This malware tries to download malicious copies of online banking apps, can make calls and send text messages on behalf of your device, and attackers can even view your screen in real time. Enough reason to stay away from this malware. What you need to know?

At the start of this month, the first signs that this Android malware had also appeared in the Netherlands arrived. The services of the German and British governments have already warned about this malware, and this is not unjustified: it is a fairly advanced malware that can have significant (financial) consequences for the affected user.

Cheated ?! So he has He wrote a comprehensive background article This explains the nature of this malware in more detail. This article explains how this malware spreads, how to recognize it, what it can do and how you can get rid of it. If you missed this article, it is best that you read it calmly. The warning was not unfounded: telecom provider KPN had clients last week Be warned about this harmful malware.

The police have also been informed. As a result of the first reports of victims, they see enough reason to warn the Dutch, according to the tweet below.

FluBot Malware Appears in DHL Dummy Tracking & Tracking App

When did you cheat ?! The first warning of this malware was posted, and the only known example was a similar fake app in the corporate identity of UPS. We expected at the time that it wasn’t unreasonable that the same malware would be displayed in fake apps from other major carriers, and that appears to be the case now.

See also  Software update: CCleaner 6.06 - Computer - Downloads

Below is an example SMS message presenting this malware and an example of a related “DHL” application installation window that already contains malware.

The second step of the instructions tells you to give your phone permission to install unknown apps. This, of course, is not without reason: these apps will not pass the Google Play Store scan.

Now there might be legitimate reasons for installing something outside of the Play Store, but this actually means you have to know exactly what you’re doing. We advise against those with little or no knowledge in cybersecurity to install unfamiliar applications by bypass methods: This is actually not necessary for normal home, garden and kitchen use and you are at high risk.

In this case, this kite is just right. Here is a brief summary of what this malware can do:

  • The attacker can Watch in real time on your phone screen;
  • The attacker is trying Installing malicious copies of online banking applications;
  • An attacker could act on your device’s behalf Send a text message To increase the spread of malware;
  • The attacker can act on your behalf Click On Perform actions;
  • An attacker can create a Install keylogger;
  • The attacker can get on Copying contacts;
  • The attacker can Open apps;
  • The attacker can Change text entry

Clear Case: This is something that you don’t want to have on your device under any circumstances. Always be careful when receiving text messages about sent packages: It has been a popular scam hoax among hackers and scammers for months.

Leave a Reply

Your email address will not be published. Required fields are marked *