Researchers at Malwarebytes observed two instances of pre-installed malware targeting critical applications on Android devices.
Mobile threats are growing both in number and severity. To protect crucial data, organizations need mobile threat defense solutions that can replicate the accuracy of manual analysis on a large scale.
Security researchers revealed that two mobile malware threats, Xloader and FakeSpy, may have been developed and launched by the same cybercriminal group.
The TimpDoor malware family enables cybercriminals to turn infected Android devices into network proxies without users' knowledge.
Researchers uncovered an adaptable Android Trojan known as GPlayed that masquerades as Google Apps to spy on and steal information from victims.
Mobile's latest malware threat is more than just a banking Trojan — it's an all-in-one Android attack that combines ransomware, phishing and keylogging to compromise devices.
IBM X-Force reported that mobile malware developers uploaded at least 10 malicious downloader apps to the Google Play Store as the first step in a process that fetches BankBot Anubis.
The mobile revolution has made it simpler and faster for banking customers to conduct financial transactions, but it has also expanded the attack surface for fraudsters aiming to steal sensitive data.
Mobile threat prevention enables organizations to proactively protect their devices, users, apps and data from malicious actors.
Cybercriminals are emulating PC malware to develop mobile banking Trojans that leverage malicious miners to steal cryptocurrency and deliver it to attacker-controlled wallets.