USD
41.53 UAH ▼0.07%
EUR
48.02 UAH ▲1.07%
GBP
56.32 UAH ▲0.35%
PLN
11.23 UAH ▲0.52%
CZK
1.94 UAH ▲0.95%
Extend: The updated version of the harmful Godfather program has returned to new...

Bank applications on smartphones attacks a dangerous hacker software: what is known

Extend: The updated version of the harmful Godfather program has returned to new opportunities that further simplify hackers theft of money through bank mobile applications. Earlier, Godfather was known to imposed fake entry screens in financial applications. In turn, the new version of the program fully captures the applications, reports Infosecurity Magazine, citing cybersecurity professionals.

According to Zimperium experts, instead of creating counterfeit custom Godfather interfaces, it now launches virtual specimens of applications inside the isolated environment on the device itself. This enables the attackers to intercept the credentials during the system inputs, interact with applications just like a true user, as well as connect to the internal API to change the behavior of the program.

"The sophisticated development of the Banking Harmful software of the Godfather, which uses advanced virtualization technologies on devices, means a significant violation of trust between users and their mobile applications," said Eric Schweik, Salt Security Cybersecurity Director. Using virtualization to hide their activity, Godfather bypasses most of the usual means of detection.

The program simulates the behavior of the user so convincing that even the fraud system is difficult to distinguish it from legitimate activity. Researchers found that at first this advanced threat was aimed at banking users in Turkey. Experts do not rule out that the attackers will try to implement this approach in other countries.

"Now, as never before, organizations need to constantly show vigilance and willingness, as well as to act decisively under the first signs of suspicious behavior," said Eprill Lenhard, Chief Manager of Qualys products. We will remind, an attempt to be stopped from news mails, promotions and other spams on e -mail can lead to phishing attacks or the installation of harmful software.