BaFin Warns 400 Crypto And Banking Apps Targeted By Godfather Malware

Key Points:

  • The GodFather virus, according to BaFin, has targeted 400 banking and cryptocurrency apps.
  • The malware steals login information, including two-factor authentication tokens.
The “GodFather” Android virus is being used by hackers to attack banking and cryptocurrency mobile apps, according to a warning from Germany’s financial watchdog BaFin.
BaFin Warns 400 Crypto And Banking Apps Targeted By Godfather Malware

In the statement, BaFin said that the virus has so far hit 400 cryptocurrency and financial systems, including those hosted in Germany and 15 other nations.

It is unclear exactly how the software gets onto the infected end devices of consumers. Godfather is known to display fake websites of regular banking and crypto apps. If consumers log in via these websites , their login data is transmitted to the cyber criminals.

The malware also sends push notifications to get the codes for two-factor authentication. With this data, the cyber criminals may be able to gain access to consumers’ accounts and wallets.

Security experts claim that the virus may impersonate the Google Protect program, giving it access to the victim’s phone’s accessibility settings. The virus can increase the number of infected programs in its pool thanks to this access. It accomplishes this by recording keystrokes when users log in to apps that aren’t on its list of infected apps using the phone’s built-in screen capture features.

According to a PCrisk analysis, there are 200 banking apps, 100 cryptocurrency exchanges, and 94 cryptocurrency wallets included in this.

GodFather shows fake login pages for legitimate baking and crypto exchange applications. Those phishing pages are used to steal credentials (login information like usernames, customer IDs, passwords, etc.). GodFather targets more than 200 banking apps and over 100 cryptocurrency exchange platforms, and 94 crypto wallet apps.

BaFin Warns 400 Crypto And Banking Apps Targeted By Godfather Malware

The notification made today is the most recent to alert people to the escalating danger presented by the GodFather virus. GodFather belongs to a group of Android-based trojans that target mobile banking and cryptocurrency apps, together with Gustuff. By showing phoney copies of popular banking and cryptocurrency trading websites, it deceives its victims. The virus can be used by cybercriminals to steal users’ login information.

Additionally, SMS messages from the victim’s smartphone can be stolen by the GodFather spyware. As a result, malware may be used by hackers to get around two-factor authentication requirements.

To avoid such fake applications, Android users have been asked to research apps before installing them. It has also been recommended for Android users enable Google Play Protect. Additionally, according to PCrisk, machines with their language settings set to Uzbek, Russian, Azerbaijani, Kazakh, Kyrgyz, Armenian, Tajik, Belarusian, or Moldovan cannot be infected by the virus.

DISCLAIMER: The Information on this website is provided as general market commentary and does not constitute investment advice. We encourage you to do your own research before investing.

Join us to keep track of news: https://linktr.ee/coincu

Website: coincu.com

Thana

Coincu News

BaFin Warns 400 Crypto And Banking Apps Targeted By Godfather Malware

Key Points:

  • The GodFather virus, according to BaFin, has targeted 400 banking and cryptocurrency apps.
  • The malware steals login information, including two-factor authentication tokens.
The “GodFather” Android virus is being used by hackers to attack banking and cryptocurrency mobile apps, according to a warning from Germany’s financial watchdog BaFin.
BaFin Warns 400 Crypto And Banking Apps Targeted By Godfather Malware

In the statement, BaFin said that the virus has so far hit 400 cryptocurrency and financial systems, including those hosted in Germany and 15 other nations.

It is unclear exactly how the software gets onto the infected end devices of consumers. Godfather is known to display fake websites of regular banking and crypto apps. If consumers log in via these websites , their login data is transmitted to the cyber criminals.

The malware also sends push notifications to get the codes for two-factor authentication. With this data, the cyber criminals may be able to gain access to consumers’ accounts and wallets.

Security experts claim that the virus may impersonate the Google Protect program, giving it access to the victim’s phone’s accessibility settings. The virus can increase the number of infected programs in its pool thanks to this access. It accomplishes this by recording keystrokes when users log in to apps that aren’t on its list of infected apps using the phone’s built-in screen capture features.

According to a PCrisk analysis, there are 200 banking apps, 100 cryptocurrency exchanges, and 94 cryptocurrency wallets included in this.

GodFather shows fake login pages for legitimate baking and crypto exchange applications. Those phishing pages are used to steal credentials (login information like usernames, customer IDs, passwords, etc.). GodFather targets more than 200 banking apps and over 100 cryptocurrency exchange platforms, and 94 crypto wallet apps.

BaFin Warns 400 Crypto And Banking Apps Targeted By Godfather Malware

The notification made today is the most recent to alert people to the escalating danger presented by the GodFather virus. GodFather belongs to a group of Android-based trojans that target mobile banking and cryptocurrency apps, together with Gustuff. By showing phoney copies of popular banking and cryptocurrency trading websites, it deceives its victims. The virus can be used by cybercriminals to steal users’ login information.

Additionally, SMS messages from the victim’s smartphone can be stolen by the GodFather spyware. As a result, malware may be used by hackers to get around two-factor authentication requirements.

To avoid such fake applications, Android users have been asked to research apps before installing them. It has also been recommended for Android users enable Google Play Protect. Additionally, according to PCrisk, machines with their language settings set to Uzbek, Russian, Azerbaijani, Kazakh, Kyrgyz, Armenian, Tajik, Belarusian, or Moldovan cannot be infected by the virus.

DISCLAIMER: The Information on this website is provided as general market commentary and does not constitute investment advice. We encourage you to do your own research before investing.

Join us to keep track of news: https://linktr.ee/coincu

Website: coincu.com

Thana

Coincu News