Quick Hill has also released a list of Indian bank apps that have been attacked by this Android banking Targon malware. Axis Mobile, HDFC Bank MobileBanking, SBI Somewhere Private, HDFC Bank MobileBanking Lite, ICICI Bank’s iMobile, IDBI Bank Go Mobile +, Abhay IDBI Bank Limited, IDBI Go Mobile, IDBI Bank Union Banking and UnionBanking MPPBbook, Union Bank The target of the malware.
Quick Hill says Android.banker.A9480 malware comes through a fake Flash Player app in third-party stores via cybercriminal Flash Player making it the only way to attack the app. Users are repeatedly asked to activate their administrative rights as soon as they download this dangerous application. The report states that this app keeps popping up until administrative rights are activated.
After the app is installed on the smartphone, users hide this icon with it. This dangerous app performs its plans by staying in the background. First searches for 232 backing applications on mobile that are targeted. If the application finds a banking app, it sends a fake notification like a banking app. If users then open the notification, they get a fake login window. This is where the user’s login ID and password are stolen.
According to the blog posted by Quick Hill, this malware can receive and send SMS. This application can also upload contact lists and locations and send fake notifications. Because this malware can also monitor incoming and outgoing SMS. In such cases, it may interfere with the OTP-based two-factor authentication of the user’s bank account.