ALL >> Computers >> View Article
Android Mobile Operating Systems Hit By Sms Grabbing Malware
Zeus in the Mobile or Zeus Mitmo (Man-in-the-mobile) or ZitMo (Zeus-in-the-Mobile) has struck again. The information stealing Trojan aims at intercepting and extracting the mTAN or mobile transaction authentication number sent by banks to authenticate online banking transactions. The single use transaction number serves the two-factor verification process of banks. In the latest case, security researchers at Sophos and Kaspersky have identified a new version of ZitMo, which targets Android operating systems. The malware disguises itself as legitimate security software from Trusteer or Kaspersky. In the case of the former, ZitMo appears to users as Trusteer Rapport, while in the case of the later the malware appears as Mobile Security 9. When unwary users fall prey to the scam and download the fake application, they inadvertently download malware on their mobile phones. The malware displays icon of the security software, which look similar to that of legitimate security software from Trusteer or Kaspersky.
ZitMo first appeared last year, when cybercriminals Targeted Symbian operating systems in Spain. Earlier this year, ...
... ZitMo hit headlines by targeting customers of ING Bank Poland. Cybercriminals initially download a malware in the computer systems of the individuals. When customers of a bank visit a bank website, they receive a security notification seeking their mobile numbers and type of device. When customers enter the number, they receive a SMS link, which directs to a link for downloading software required for receiving the authentication numbers. However, customers actually download ZitMo malware. The counterfeit security software installs a broadcast receive for intercepting all Short Message Service (SMS) messages. The fake application encodes the extracted messages and sends them to a remote command and control server of Zeus botnets. According to security researchers at Sophos, the malware transmits the messages through HTTP POST requests. Cybercriminals then conduct fraudulent transactions on behalf of the customer. Individuals must acquaint themselves of different mobile and computer security related threats through e-tutorials and online IT courses. They can also keep themselves updated of latest threats by following security blogs of Internet security firms and advisories by Computer Emergency Response Teams.
With the latest variant, ZitMo can now target mobile devices, which use Symbian, Windows Mobile, Blackberry and Android mobile operating systems. However, security researchers have claimed that the functionality of Zitmo for Android differs from those deployed for other operating systems. As such, there is a possibility of further upgrades to the existing version of the malware for Android. Usually, attackers insert malware in computer systems and mobile devices through drive-by-downloads, malvertizing or malicious links in spam e-mails. Professionals may update themselves on latest modus operandi of cybercriminals through security certifications and online IT degree programs.
Regular evaluation of the software products through penetration testing is crucial to identify threats and improving security mechanism of the devices. Increased mobility of employees for official purposes has resulted in greater use of Smartphones and mobile applications. Cybercriminals may devise mechanisms or variants of malware to extract confidential business and personal information. Professionals qualified in IT degree programs may help organizations in understanding different security risks, identify threat vectors and take measures to improve the security practices in the organization.
Add Comment
Computers Articles
1. Cpd Accredited Typing Certificate Uk - Speed Test & Online CertificationAuthor: Kowser
2. Safe Connection With Mickey Mouse Cables- An Ultimate Guide
Author: Jennifer Truong
3. Develop A Widget For Ios App
Author: goodcoders
4. Develop An App From Scratch In 13 Steps
Author: goodcoders
5. The Best Antivirus Software For 2025
Author: Jasbeer SIngh
6. How To Develop An App From Scratch In 13 Steps
Author: goodcoders
7. 7 Steps To Create A Safe Mobile App
Author: goodcoders
8. Why Do Businesses Need Vendor Management Software?
Author: Kiran
9. React Native App Development By Alvi Software
Author: Alvi Software
10. Custome
Author: Owner
11. Few Good Insights To Follow With Pc Gaming In Australia!
Author: Jack Williams
12. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy
13. How To Choose The Right Technology For Your mobile App?
Author: goodcoders
14. The Rise Of User Centered Web Design
Author: goodcoders
15. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders