When shopping online, be careful of this malware.

When shopping online, be careful of this malware.

When shopping online, be careful of this malware.

Many people prefer shopping online because it is more convenient than shopping in person. As the number of people shopping online grows, so do the risks of online shopping. Fraudsters have devised new methods to defraud online shoppers. Recently, researchers from global cyber security and anti-virus brand Kaspersky discovered a new Trojan application that is increasingly popular shopping app ratings and installations while also spreading obnoxious ads. This malware dubbed the 'Shopper' has infected more than 14% Indians.

This malicious app visits smartphone app stores, downloads and launches applications, and leaves fake reviews on the user's behalf. The application did all this while remaining hidden from the device's owner. At the moment, the real threat posed by this malicious app is limited to unsolicited advertisements, fake reviews, and ratings issued in the user's name. But we can't say they'll keep doing it.

Because of this malicious app, you must exercise extreme caution when shopping online. When it comes to online shopping, many people rely heavily on reviews. However, because of this new Trojan application, you cannot fully trust what you see online, as this app increases the ratings and installations of popular shopping apps. It also disseminates a large number of advertisements.

At the moment, the app's focus is solely on retail, but it has the potential to allow criminals to spread false information through users' social media accounts and other platforms. The researchers dub the Trojan' Shopper' due to its extensive obfuscation and use of the Google Accessibility Service.

Users can set a voice to read out app content and automate interaction with the service's user interface. This is intended to assist people with disabilities. However, in the hands of attackers, this feature poses a severe threat to the device's owner. Once granted access to the service, the malware will have nearly limitless interactions with the system interface and applications.

Once the malware is granted permission to use the service, it will have unrestricted access to the system interface and applications. The malware will capture screen data, press buttons, and even copy user gestures. It is unknown how this malicious application is spreading. It is assumed that users downloaded the malicious application while attempting to download the legitimate application from fraudulent ads or third-party app stores. To avoid detection by the device owner, the app disguises itself as a system application and employs a system icon called 'ConfigAPKs.'

When the victim's phone's screen is locked, the malicious app launches, collects data from the phone and sends it to the attacker's servers. The server sends the commands to the application, which executes them.

Are you dissatisfied with a product or service? Go to www.savefromfrauds.com  portal, Savefromfrauds, and file a complaint. We'll contact the relevant entity and assist you with the resolution. We publish articles and videos regularly to raise awareness about fraudulent activities. You can also post company reviews on www.savefromfrauds.com.


Leave a Comment:
CAPTCHA

Comments

no comments!!

Search