Malware that specializes in attacking bank accounts returns to threaten Android users

 The dangerous Medusa banking malware is back to threaten Android users.



Medusa is known as a dangerous type of banking malware. It disappeared from the radar of researchers for a year and now has suddenly reappeared and is targeting Android users in many countries. countries, including the US, France, Italy, Canada, Spain, UK and Turkey.


Medusa banking malware is returning to attack Android users.

Medusa banking malware is returning to attack Android users.


According to security experts, Medusa is capable of making unauthorized transactions from infected phones, monitoring keystrokes, controlling the screen, and interfering with SMS messages. In particular, the new version of Medusa is more streamlined, requiring fewer access rights but still causes serious consequences.


Applications used to spread malware include fake Chrome browser, 5G connection application and 4K Sports online video viewing application. Users are advised to immediately delete these applications if detected on their phones.


Although not yet appearing on the Google Play Store, Medusa can still infect Android phones through installing applications from untrusted sources (sideload). Experts warn that more and more cybercriminals are participating in this malware distribution activity, making detection and prevention more difficult.


To protect themselves, Android users should avoid installing apps from unknown sources, only download apps from the Google Play Store, and regularly update security patches. In addition, using reputable antivirus software is also an effective preventive measure.


A study found that hundreds of millions of Chrome users have installed malicious extensions.

According to TechSpot, a recent study shocked the world when it said that up to 280 million Chrome browser users have installed malicious extensions in the past 3 years. This number is much higher than Google's claim that less than 1% of installations from the Chrome Web Store contain malware.


More than 280 million Chrome users have installed malicious extensions.

More than 280 million Chrome users have installed malicious extensions.


The research was conducted by scientists from Stanford University and the CISPA Helmholtz Center for Information Security. They analyzed notable security extensions (SNE) on the Chrome Web Store, including those that were malicious, violated policies, or contained security vulnerabilities.


Watch More Image Part 2 >>>

The results show that from July 2020 to February 2023, there were 346 million SNE installations, of which 280 million were extensions containing malicious code. More worryingly, these malicious extensions often stay on the Chrome Web Store for a long time, an average of 380 days, while safe extensions often disappear quickly.


The study also found that relying on user reviews to detect malicious extensions is ineffective, as many malicious extensions still receive high ratings. The researchers recommend that Google increase its monitoring of extensions, especially those with code similarities or using old, hazardous libraries.


While Google claims to have dedicated security teams to moderate and monitor extensions, this research suggests that the real situation may be much more serious than Google has publicly acknowledged. Chrome users should be more cautious when installing extensions and regularly review their list of installed extensions to ensure the safety of their devices and personal data.

Đăng nhận xét

Mới hơn Cũ hơn

Support me!!! Thanks you!

Join our Team

Please watch the video on YouTube to support me. Thank you very much!