Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
Sports
History
News
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/ec/f3/a7/ecf3a7b8-a994-74af-d1ad-a294a94143f8/mza_8596351112906040944.jpg/600x600bb.jpg
Cyber94
Mohammed Sarker
44 episodes
4 days ago
Cyber94 delivers daily cybersecurity news, major hack breakdowns, and real stories from past cyberattacks. Our mission is to raise cyber awareness and educate the public with easy-to-understand insights that help keep everyday people safe from scams, breaches, and online threats. Stay informed. Stay protected. Cyber94.
Show more...
Tech News
News
RSS
All content for Cyber94 is the property of Mohammed Sarker and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Cyber94 delivers daily cybersecurity news, major hack breakdowns, and real stories from past cyberattacks. Our mission is to raise cyber awareness and educate the public with easy-to-understand insights that help keep everyday people safe from scams, breaches, and online threats. Stay informed. Stay protected. Cyber94.
Show more...
Tech News
News
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_nologo/44818472/44818472-1763313589781-2fe1476894915.jpg
Banking Apps Under Attack How Hackers Turn Trusted Financial Tools Into Phone Hijacking Weapons
Cyber94
4 minutes 45 seconds
3 weeks ago
Banking Apps Under Attack How Hackers Turn Trusted Financial Tools Into Phone Hijacking Weapons

The Growing Threat of Banking Malware

A sophisticated new cybercrime campaign is targeting smartphone users by weaponizing the very apps they trust most. Security researchers have uncovered a dangerous operation where hackers take legitimate banking applications, inject malicious code, and redistribute them to unsuspecting victims.

How the Attack Works

The cybercriminal group known as GoldFactory has developed an alarming technique that goes far beyond typical phishing scams. Instead of creating obvious fake apps, they decompile real banking applications from legitimate financial institutions, embed their own malicious code, and repackage them to look identical to the original.

Victims receive convincing messages appearing to come from trusted sources like electricity providers or government agencies, directing them to fake websites that perfectly mirror official pages. These sites prompt users to download what appears to be a legitimate app update or payment portal.

Advanced Malware Capabilities

Once installed, the compromised apps function normally for banking activities, making detection nearly impossible for average users. However, the hidden malware requests excessive device permissions, particularly access to accessibility services. This grants attackers complete remote control over the infected device.

The malware families involved, including SkyHook, FriHook, PineHook, and Gigabug, can bypass built-in security checks, capture sensitive data, automate screen actions, and even steal facial recognition information. After completing their malicious activities, the attackers can erase traces of their presence.

Geographic Impact and Future Concerns

Currently concentrated in Southeast Asian countries including Vietnam, Thailand, and Indonesia, security experts warn this successful attack method could easily expand to other regions including the United States and United Kingdom.

Essential Protection Strategies

Defense against these sophisticated attacks relies on fundamental cybersecurity practices. Users should treat all unsolicited messages claiming to be from financial institutions or government agencies with extreme suspicion, regardless of how legitimate they appear.

Never download applications from links in text messages or emails. Always visit official app stores directly and manually type website addresses into browsers rather than clicking provided links. When in doubt, contact organizations independently using official contact information to verify any requests.

Critical Takeaways

This emerging threat demonstrates how cybercriminals are evolving beyond simple phishing attempts to create highly convincing attacks that exploit user trust in familiar brands and apps. The best defense remains careful digital habits and maintaining healthy skepticism toward unexpected communications requesting immediate action.

Cyber94
Cyber94 delivers daily cybersecurity news, major hack breakdowns, and real stories from past cyberattacks. Our mission is to raise cyber awareness and educate the public with easy-to-understand insights that help keep everyday people safe from scams, breaches, and online threats. Stay informed. Stay protected. Cyber94.