Malware that targets personal data, especially banking, is becoming even more frightening with its new versions. XLoader, which was first detected in recent years Android With its new version, the malware acts like Google Chrome and accesses user data. Here are the details…
XLoader Android malware is back with a new version
A new version of the XLoader malware (aka MoqHao) has been discovered. Previously, this malware was detected in many countries, especially the USA, UK, Germany, France, Japan, South Korea and Taiwan.
The malware spreads via SMS text messages containing a shortened URL link. However, XLoader becomes active immediately after installation. It should be noted that this allows the malware to run undetected in the background while personal data is stolen.
Making a statement about the malware, McAfee said, “Malicious activities automatically start while the application is being installed. “We have already reported this technique to Google, and they are currently working on implementing blocking measures to prevent this type of automated execution in future Android versions.” He stated:
The XLoader software poses as coming from Google Chrome, making permission requests asking for permission to send and view SMS (text) messages, and allowing the rogue Chrome to run in the background. The malware, which also requests permission to make fake Chrome your default SMS application, can also access users’ SMS details.
McAfee highlighted that the new XLoader malware is much more dangerous than its predecessor because it requires minimal interaction from the victim. Security researchers recommend that you do not click on shortened links, even if they come from people you know.
Source link: https://shiftdelete.net/xloader-android-zararli-yazilimi-yeni-versiyon