Malware that specializes in attacking bank accounts returns to threaten Android users

 The dangerous Medusa banking malware is back to threaten Android users.

Medusa is a dangerous banking malware that has been out of the radar of researchers for a year and has now suddenly resurfaced and is targeting Android users in many countries, including the US, France, Italy, Canada, Spain, UK, and Turkey.

Medusa banking malware is back to attack Android users.

According to security experts, Medusa is capable of making unauthorized transactions from infected phones, monitoring keystrokes, controlling the screen, and interfering with SMS messages. In particular, the new version of Medusa is more streamlined, requiring fewer access rights but still causes serious consequences.

Apps used to spread the malware include fake Chrome browsers, 5G connectivity apps, and 4K Sports video streaming apps. Users are advised to delete these apps immediately if they are found on their phones.

Although Medusa has not yet appeared on the Google Play Store, it can still infect Android phones through installing apps from untrusted sources (sideloading). Experts warn that more and more cybercriminals are getting involved in this malware, making it harder to detect spreading and stop.

To protect themselves, Android users should avoid installing apps from unknown sources, only download apps from the Google Play Store, and regularly update security patches. In addition, using reputable antivirus software is also an effective preventive measure.

A study found that hundreds of millions of Chrome users have installed malicious extensions.

According to TechSpot, a recent study shocked the world when it said that up to 280 million Chrome browser users have installed malicious extensions in the past 3 years. This number is much higher than Google's claim that less than 1% of installations from the Chrome Web Store contain malware.

See more beautiful photo albums Here >>>

More than 280 million Chrome users have installed a malicious extension.

The study was conducted by scientists from Stanford University and the CISPA Helmholtz Center for Information Security. They analyzed notable security extensions (SNEs) on the Chrome Web Store, including those that contained malicious code, violated policies, or contained security vulnerabilities.

The results show that from July 2020 to February 2023, there were 346 million SNE installations, of which 280 million were extensions containing malicious code. More worryingly, these malicious extensions often stay on the Chrome Web Store for a long time, an average of 380 days, while safe extensions often disappear quickly.

The study also found that relying on user reviews to detect malicious extensions is ineffective, as many malicious extensions still receive high ratings. The researchers recommend that Google increase its monitoring of extensions, especially those with code similarities or using old, hazardous libraries.

While Google claims to have dedicated security teams to moderate and monitor extensions, this research suggests that the real situation may be much more serious than Google has publicly acknowledged. Chrome users should be more cautious when installing extensions and regularly review their list of installed extensions to ensure the safety of their devices and personal data.

Đăng nhận xét

Mới hơn Cũ hơn

Recent in Sports

Join our Team