Warning: Rogue - malicious software that steals sensitive data
Recently, security researchers at Checkpoint have discovered a new type of malware that allows hackers to steal accounts on phones, including usernames, passwords, and sensitive data. other.
The new malware is called 'Rogue', which is a combination of two previous viruses, Cosmos and Hawkshaw.
Currently, Rogue is up for sale on 'underground' forums for $ 29.99. This is a relatively low-cost malware that helps hackers collect location data, take screenshots, use cameras, record calls . and many other features that users do not have. know it.
Hackers can't install Rogue directly on your phone, instead, they spread the malware through other apps. When a user accidentally installs, Rogue will ask for phone access, if you don't grant it it will send requests repeatedly until you give it permission.
Once you have access to your phone, Rogue will automatically hide the icon from the screen. Also install a separate notification service, used to collect OTP when you transact online, account name, password or authentication code when logging in.
In case you use virus scanner software and detect Rogue, the screen will immediately display the message 'Are you sure delete all data?' This will scare the user and stop the malware uninstallation.
In addition, Rogue abused Google's Firebase service to pretend to be a legitimate application.
To avoid Rogue infection, users should regularly update security on the phone by going to Settings (settings) - About phone (introduction) - System update (system update). Note that the names and locations of the options may vary depending on the device you are using.
You should also restrict the installation of apps from unknown sources or third-party websites (install only through Google Play), and take extra care when authorizing apps. If you find an app asking for too many unreasonable permissions, decline and uninstall the app immediately.
You should read it
- How to create and use Hyper-V checkpoints in Windows 10
- Some popular fake security software - Part 1
- The steps to clean up the virus 'Activate this edition of Windows' attack your Windows computer
- Some popular fake security software - Part 2
- Detecting a vulnerability that makes 3,000 companies using Microsoft Azure vulnerable to hackers reading data over the past 2 years
- How many types of malware do you know and how to prevent them?
- 10 typical malware types
- Small businesses how to fight hackers?
- What is Safe Malware? Why is it so dangerous?
- Instructions for removing Antimalware Doctor rogue software
- Can a VPN Fight Malware?
- What is Malware? What kind of attack is Malware?