FakeSpy Is Back as Part of New SmiShing Campaign, Adds New Features
Initially discovered by TrendMicro's researchers in June, the FakeSpy Android data stealer malware that targets Japanese and Korean users has been detected by Fortinet doing the rounds as part of a new malware campaign.
The FakeSpy malware sample Fortinet identified seems to have new capabilities and it can now spread itself to other Android devices by sending maliciously crafted text messages to lists of phone numbers it receives from its command-and-control (C&C) server.
This FakeSpy variant propagation chain starts with a fake site designed to look like the website of a Japanese express delivery service company which will display a pop-up message asking you to authenticate using a phone number when clicking anywhere on the site.
Af... (read more)
from Softpedia News / Global https://ift.tt/2RkIHK5
The FakeSpy malware sample Fortinet identified seems to have new capabilities and it can now spread itself to other Android devices by sending maliciously crafted text messages to lists of phone numbers it receives from its command-and-control (C&C) server.
This FakeSpy variant propagation chain starts with a fake site designed to look like the website of a Japanese express delivery service company which will display a pop-up message asking you to authenticate using a phone number when clicking anywhere on the site.
Af... (read more)
from Softpedia News / Global https://ift.tt/2RkIHK5
No comments