Researchers warn of these three new ‘dangerous’ malware targeting Android users

04/07/2024
Android remains the most popular target operating system for cybercriminals as they use three new ‘dangerous’ malware variants to attack smartphones, a report has said. About 33.8 million attacks on mobile devices from malware, adware and riskware were blocked in 2023 globally.
Cybersecurity company Kaspersky reported a significant rise in mobile malware attacks in 2023, with a 50% increase of such attacks over the previous year.The researchers have also identified three new and concerning Android malware variants: Tambir, Dwphonand Gigabud. These malicious programs pose a threat to user privacy and security.
How these Android malware are ‘dangerous’
The Tambir, Dwphon, and Gigabud malicious programs exhibit diverse features, ranging from downloading other malicious programs and credential theft to bypassing two-factor authentication (2FA) and screen recording, jeopardizing user privacy and security.
“Mobile malware activity has significantly increased after a period of relative calm,” said Jornt van der Wiel, a senior security researcher at Kaspersky.
Tambir can disguise itself as an IPTV app to steal sensitive information like SMS messages and keystrokes.
Dwphon, on the other hand, mainly targets Chinese smartphones, and gathers device and personal data while masquerading as a system update app.
The third, Gigabud malware, was initially focused on stealing banking credentials but reportedly it has now evolved into fake loan malware with screen recording capabilities to bypass two-factor authentication.
“Users should exercise caution and should avoid downloading apps from unofficial sources, carefully reviewing app permissions,” said Wiel.
He further mentioned that these apps lack exploitation functionality and depend solely on permissions granted by the user, hence, users should carefully grant permission to apps. Users can also add anti-malware tools that can also help preserve the integrity of their Android devices.

Tags: ,