0
A blow is using mobile games to infiltrate a virus on people’s cell phone and, with it, access bank applications and steal all the money they have in their accounts.
Understand how the virus that steals pix works and knows how to protect yourself. Photo: Reproduction
Kapersky experts in Brazil explain that this mode of coup is an evolution of the “ghost hand” and promotes bank fraud automatically on the victim’s cell phone. According to them, the bank trojan hides behind a fake app, which disguises themselves on other popular apps and offers prizes for those who play. They are also not available at official stores, for example.
The blow happens with the authorization of the victims. When the app is installed, the bank trojan calls for accessibility permission through a message that will appear until the victim accepts. This is a native tool for Android operating system created for people with disabilities who need to use their cell phone.
Crime can happen even when the phone is turned off. There is also a solution designed for users who put face recognition or biometric authentication as a lock to access the bank’s application. In this case, the virus expects the victim to open the platform, try to make a transfer and redirect the Pix.
“When a pix is done, ATS malware will block the screen in the“ processing transfer ”step. While the person expects, the virus will click on“ back ”and change the recipient and the value of the transfer. This exchange occurs quickly, precisely because the whole process was automated. When the screen returns to the account holder place the password, so the sense of redirecting”, explains Fabio Kaspersky’s Marenghi in Brazil.
The expert also warns that this automated version of the ghost hand is more dangerous precisely because it optimizes the time of the criminal scammer, who only needs to focus his skills in reaching new people while the virus scams.
“The ghost hand is a blow in which the criminal manually performs fraud. When the task is automated, the criminal can focus 100% of his“ work ”in the infection of new victims – only it is possible to increase profits. Another important point is that – when the criminal is sleeping or deciding to go with the family to the beach over the weekend, he loses. Work. These two critical points justify how this blow grew so fast, ”explains Marenghi.
How to avoid the virus that steals Pix?
To avoid being a victim of this scam, Kaspersky experts recommend:
1 – Download apps only from the official store
Although there are malicious apps in them, the chance is much lower than being fooled. Not to mention that companies remove the malicious app, giving more work to the criminal. Unofficial stores are not the same care-not to mention that the site can be fake.
2 – Never give accessibility permission
All modern bank trojans need this authorization to work. On the other hand, this functionality is only necessary if the person has any physical limitation. In other words, if an app asks for this authorization, there is a great chance of being a blow.
3 – Enable the authentication of two factors (2FA)
Protect your accounts online, especially those linked to payment methods with 2FA.
4 – Use a security solution
A quality security solution will prevent both fake site access where the bank is lowered as well as its installation. Do not go silly and protect the phone the same way as the computer or notebook.