The malware is even capable of stealing and uploading files found on the device, and will do so as long as it receives the commands as seen in Figures 8 and 9 respectively.įigure 9. In addition to its info-stealing capabilities, the malware can also gather additional credentials through a phishing attack. It's capable of displaying fake Facebook and Google pop-ups to phish for the user’s account details. If the user inputs his/her credentials, the fake pop-up will only state that the log-in was unsuccessful. Fake Facebook login pop-up User distribution At which point the malware would already have stolen the user’s credentials.įigure 11. Part of what makes this case interesting is how widely its applications have been distributed. Top countries with the most number of affected users Through our back-end monitoring and deep research, we were able to see the general distribution of affected users and found that they hailed from a total of 196 different countries.įigure 12. ![]() ![]() ![]() ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |