vlog

Skip to content
NOWCAST vlog News at 10pm Weeknights
Live Now
Advertisement

Banking malware that records keystrokes, makes phonecalls targets Android users

Svpeng infected 318,000 Android devices last November

Banking malware that records keystrokes, makes phonecalls targets Android users

Svpeng infected 318,000 Android devices last November

Advertisement
Banking malware that records keystrokes, makes phonecalls targets Android users

Svpeng infected 318,000 Android devices last November

A dangerous form of Android banking malware has received an alarming upgrade. Svpeng - which steals a user's financial data - can now record keystrokes and take screenshots of smartphone activity, sending the information to cybercriminals. “It grants itself device administrator rights, draws itself over other apps, installs itself as a default SMS app, and grants itself some dynamic permissions that include the ability to send and receive SMS, make calls, and read contacts,” Kaspersky Lab senior malware analyst Roman Unuchek told ThreatPost Monday. “Furthermore, using its newly gained abilities, the Trojan can block any attempt to remove device administrator rights...preventing its uninstallation.”The latest version of Svpeng was spotted in July on "malicious web sites" under the guise of a Flash Player.Svpeng can embed itself into a smartphone's Accessibility Services feature, which helps disabled users navigate the device. Last November, 318,000 Androids were attacked by an earlier version, which gained access through Google Adsense advertisements. The malicious software has been infecting devices since 2013, but the latest upgrade has only affected a small number of devices so far. Here's how to avoid Svpeng:1. Don't open files that you don't recognize. 2. Don't install apps from third-party sources. 3. Install updates as soon as they become available. 4. Use anti-virus software on all Android-based devices.

A dangerous form of Android banking malware has received an alarming upgrade.

Svpeng - which steals a user's financial data - can now record keystrokes and take screenshots of smartphone activity, sending the information to cybercriminals.

Advertisement

Related Content

“It grants itself device administrator rights, draws itself over other apps, installs itself as a default SMS app, and grants itself some dynamic permissions that include the ability to send and receive SMS, make calls, and read contacts,” Kaspersky Lab senior malware analyst . “Furthermore, using its newly gained abilities, the Trojan can block any attempt to remove device administrator rights...preventing its uninstallation.”

The was spotted in July on "malicious web sites" under the guise of a Flash Player.

Svpeng can embed itself into a smartphone's Accessibility Services feature, which helps disabled users navigate the device. 318,000 Androids were attacked by an earlier version, which gained access through Google Adsense advertisements.

The malicious software has been infecting devices since 2013, but the latest upgrade has only affected a small number of devices so far.

Here's how to avoid Svpeng:

1. Don't open files that you don't recognize.

2. Don't install apps from third-party sources.

3. Install updates as soon as they become available.

4. Use anti-virus software on all Android-based devices.