![]() ![]() These malicious apps are designed to extract sensitive information, including user credentials and Two-Factor Authentication (2FA) codes. The malware operates via a set of malicious Android applications, each of which mimics a popular and legitimate app with over 100,000 installs. The goal of this phishing scheme is to steal sensitive information, including user credentials (like 2FA) and credit card details.Ĭheck Point Research (CPR) has spotted a concerning new malware strain, dubbed FluHorse.It mimics legitimate apps, each of which has already been downloaded by over 100,000 users. The malware campaign is highly sophisticated and is directed at a variety of sectors in Eastern Asia.Check Point Research (CPR) uncovered a fresh strain of malware that is cleverly disguised as popular Android applications from East Asia.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |