Android Marcher Variant Makes Rounds as Adobe Flash Player Update

  /     /     /  
Publicated : 22/11/2024   Category : security


Android Marcher Variant Makes Rounds as Adobe Flash Player Update


Zscaler researchers discover a new variant of the Android Marcher malware, which aims to steal online banking credentials and credit card information.



A new variant of the Android Marcher malware uses pornographic enticements and new game hype to lure users to download a bogus Adobe Flash player, according to Zscaler researchers who discovered the latest variant.
Users are then asked to disable their security settings and allow third-party apps to install. Once the apps are installed, the malware removes its icon from the phone menu.
It then waits for the user to open one of over 40 targeted financial apps and then overlays a fake version of that financial websites login page. The malware then gleans the users login credentials.
The financial sites the new Android Marcher variant is targeting includes TD Bank, Wells Fargo, PayPal, and others.
Read more about this latest Marcher variant
here


Last News

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Android Marcher Variant Makes Rounds as Adobe Flash Player Update