Saturday, June 14, 2025
Homecyber securityBeware of FluBot Android Malware that Targets Android Users Via SMS

Beware of FluBot Android Malware that Targets Android Users Via SMS

Published on

SIEM as a Service

Follow Us on Google News

The cybersecurity researchers of Finland Aino-Maria Vayrynen of the National Cybersecurity Center have recently published a “severe alert” to notify the country’s Android users regarding a huge malicious campaign.

In this malicious campaign, the Android users were being attacked with FluBot banking malware launched via text messages sent from negotiated devices.

However, this is not the first time when FluBot has initiated any campaign, as it is being stated that this campaign is the second-largest FluBot campaign that attacked Finland.

- Advertisement - Google News

This type of malware attack is remarkably unusual and very dangerous, in this campaign, a group of text messages are being sent by the attackers.

Banking Malware goes Global

After investigating the malware attack, the experts came to know that this malware has been active since 2020. Its main motive is to steal all the following details from the victim’s devices:- 

  • Banking credentials
  • Payment information
  • Text messages
  • Contacts

At first, the threat actors have targeted the Android users of Spain along with several other European countries, and now they have targeted the Android users of Finland.

Organizations Encouraged to Inform their Personnel

The experts of NCSC-FI issued a yellow alert, which implies some general actions are to be taken by the users as soon as possible. They have notified the users by saying that if they receive a scam message, do not click on the link, and do not download the file shared through the link.

However, the situation needs to get handled as soon as possible; that’s why it is also important for organizations to understand what data the phones might have contained so that they can assess the risks because FluBot generally steals data from phones.

Recommendations

After investigating the whole malware attack, the experts suggested some general measures that are to be followed by the users; thus, we have mentioned below:

  • Always remember to perform a factory reset on your device.
  • Remember to contact your bank if you use a banking application or handle credit card information on your device.
  • If you encounter any financial losses that report them to the police.
  • Always reset your passwords on any services that you have used with the device.
  • Lastly, contact your operator, as the threat actors might use your subscription to send text messages subject to a charge.

The information security adviser at the NCSC-FI, Aino-Maria Väyrynen stated:-

“We managed to almost completely eliminate FluBot from Finland at the end of summer thanks to cooperation among the authorities and telecommunications operators. The currently active malware campaign is a new one, because the previously implemented control measures are not effective.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...