Two new sophisticated Android Banking trojan viruses are exploiting mobile users' behaviour in India to gain access to their confidential data, global IT security firm Quick Heal warned on Tuesday.
Security experts at Quick Heal Security Labs have detected "Android.Marcher.C" and "Android.Asacub.T" -- the two trojans that imitate notifications from popular social applications such as WhatsApp, Facebook, Skype, Instagram and Twitter as well as some of the leading banking apps in India.
By gaining access to incoming messages through administrative privileges, these malware also allow hackers to bypass the two-factor OTP authentication typically used for securing online transactions in India, the researchers warned.
"Indian users often download unverified apps from third-party app stores and links sent through SMS and email. This gives hackers a lucrative opportunity to steal confidential information from unsuspecting users," said Sanjay Katkar, Co-founder and CTO, Quick Heal Technologies Limited.
"The fact that we've detected three similar malware in less than six months indicates that hackers are now targeting mobile users, who are far more vulnerable to sophisticated phishing attacks," he added.
While "Android.Marcher.C" uses the Adobe Flash Player icon to look like a genuine app, "Android.Asacub.T" mimics an Android Update icon.
Whenever users access an app on the database of these malware, they are tricked into entering sensitive information such as banking credentials, card details, and login IDs/passwords before they can continue using the app.
This is not the first time that Quick Heal Security Labs has detected such a malware.
The researchers previously raised an alert in January this year about a similar Android Banking Trojan.
Known as "Android.banker.A2f8a", the malware was distributed through a fake Flash Player on third-party app stores and mimicked more than 232 banking and cryptocurrency apps.
The security researchers have recommended Android users to avoid downloading apps through third-party app stores or through links provided in SMS and email.
"Always keep 'Unknown Sources' disabled, and verify app permissions before installing any app from official stores," the security firm said.
Users must also keep their Google Play Protect service always 'ON' and install a reliable mobile security app to detect and block fake/malicious apps, it added.
--IANS
na/vd
Disclaimer: No Business Standard Journalist was involved in creation of this content
You’ve reached your limit of {{free_limit}} free articles this month.
Subscribe now for unlimited access.
Already subscribed? Log in
Subscribe to read the full story →
Smart Quarterly
₹900
3 Months
₹300/Month
Smart Essential
₹2,700
1 Year
₹225/Month
Super Saver
₹3,900
2 Years
₹162/Month
Renews automatically, cancel anytime
Here’s what’s included in our digital subscription plans
Exclusive premium stories online
Over 30 premium stories daily, handpicked by our editors


Complimentary Access to The New York Times
News, Games, Cooking, Audio, Wirecutter & The Athletic
Business Standard Epaper
Digital replica of our daily newspaper — with options to read, save, and share


Curated Newsletters
Insights on markets, finance, politics, tech, and more delivered to your inbox
Market Analysis & Investment Insights
In-depth market analysis & insights with access to The Smart Investor


Archives
Repository of articles and publications dating back to 1997
Ad-free Reading
Uninterrupted reading experience with no advertisements


Seamless Access Across All Devices
Access Business Standard across devices — mobile, tablet, or PC, via web or app
