Mobile ransomware uses scare tactics to pressure victims into paying fees to unlock their mobile device and restore lost data.
Posted: June 9, 2016
With mobile devices and SMS messaging becoming more mainstream, banks looked to capitalize and offer customers a way to access accounts and authentication transactions.
Bank Trojans go back to when mobile phones first were capable of sending SMS and accessing the Internet. Two big players in banking malware on the PC side, Zeus and SpyEye, had big success targeting Symbian eventually making their way onto Android, Zitmo/Spitmo. Eventually other players took advantage of Android’s popularity and openness to distributing Banking Trojans, with many targeting the Korean banking market.
Infected and fake bank apps are distributed through third party app stores and SMS links. Using man-in-the-middle techniques, they look to capture SMS and Internet traffic to steal account credentials and authentication codes.
These apps can be uninstalled using the mobile devices uninstall functionality. The tricky part is identifying the offending behavior and app. That is where anti-malware software can help by identifying and removing these apps.
Victims of these malicious apps can expect to see their bank accounts and credentials compromised.
Stick to trusted sources for mobile apps and avoid any third party apps requesting banking information. Use only trusted apps your bank distributes and endorses.