Friday, January 31, 2025
Homecyber securityBeware of FluBot Android Malware that Targets Android Users Via SMS

Beware of FluBot Android Malware that Targets Android Users Via SMS

Published on

SIEM as a Service

Follow Us on Google News

The cybersecurity researchers of Finland Aino-Maria Vayrynen of the National Cybersecurity Center have recently published a “severe alert” to notify the country’s Android users regarding a huge malicious campaign.

In this malicious campaign, the Android users were being attacked with FluBot banking malware launched via text messages sent from negotiated devices.

However, this is not the first time when FluBot has initiated any campaign, as it is being stated that this campaign is the second-largest FluBot campaign that attacked Finland.

This type of malware attack is remarkably unusual and very dangerous, in this campaign, a group of text messages are being sent by the attackers.

Banking Malware goes Global

After investigating the malware attack, the experts came to know that this malware has been active since 2020. Its main motive is to steal all the following details from the victim’s devices:- 

  • Banking credentials
  • Payment information
  • Text messages
  • Contacts

At first, the threat actors have targeted the Android users of Spain along with several other European countries, and now they have targeted the Android users of Finland.

Organizations Encouraged to Inform their Personnel

The experts of NCSC-FI issued a yellow alert, which implies some general actions are to be taken by the users as soon as possible. They have notified the users by saying that if they receive a scam message, do not click on the link, and do not download the file shared through the link.

However, the situation needs to get handled as soon as possible; that’s why it is also important for organizations to understand what data the phones might have contained so that they can assess the risks because FluBot generally steals data from phones.

Recommendations

After investigating the whole malware attack, the experts suggested some general measures that are to be followed by the users; thus, we have mentioned below:

  • Always remember to perform a factory reset on your device.
  • Remember to contact your bank if you use a banking application or handle credit card information on your device.
  • If you encounter any financial losses that report them to the police.
  • Always reset your passwords on any services that you have used with the device.
  • Lastly, contact your operator, as the threat actors might use your subscription to send text messages subject to a charge.

The information security adviser at the NCSC-FI, Aino-Maria Väyrynen stated:-

“We managed to almost completely eliminate FluBot from Finland at the end of summer thanks to cooperation among the authorities and telecommunications operators. The currently active malware campaign is a new one, because the previously implemented control measures are not effective.”

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity, and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Massive Hacking Forum Network Dismantled by Authorities, Impacting 10M Users

Authorities have delivered a major blow to the cybercrime world by dismantling two of...

Microsoft Enhances M365 Bounty Program with New Services & Rewards Up to $27,000

Microsoft has announced updates to its Microsoft 365 (M365) Bug Bounty Program, offering expanded...

Tata Technologies Hit by Ransomware Attack, Some IT Services Suspended

Tata Technologies, a leading provider of engineering and IT services, has reported a ransomware...

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Massive Hacking Forum Network Dismantled by Authorities, Impacting 10M Users

Authorities have delivered a major blow to the cybercrime world by dismantling two of...

Microsoft Enhances M365 Bounty Program with New Services & Rewards Up to $27,000

Microsoft has announced updates to its Microsoft 365 (M365) Bug Bounty Program, offering expanded...

Tata Technologies Hit by Ransomware Attack, Some IT Services Suspended

Tata Technologies, a leading provider of engineering and IT services, has reported a ransomware...