This malware, which returns much more sophisticated, will infect your entire contact list and will also try to steal your bank account access credentials.
One of the best antivirus that every human being has is common sense, a common sense that you must use when it comes to preventing your computer or mobile phone from being infected with the millions of malware created by cybercriminals who only want access to your device and to your bank accounts.
And this cybercriminals know very well, and to destroy our common sense, what they do is try to rush us and scare us, so that we click on a link and be infected.
Now the very dangerous malware FluBot returns, after an initial campaign in April of this year, and where it has been reactivated with new campaigns as stated by researchers from Cert NZ.
FluBot’s new malware strategy is to send us text messages referring to a delivery of a package on our behalf or that different photographs related to us have been uploaded, in a way to attract attention.
After receiving this text message about the package or photos, you will be taken to a website in which it is indicated that your mobile phone has been infected to put you in fear and hurry, but luckily there is a “security update” for you. Receiving this message does not infect the user, but it does infect the user by clicking on the link for the security update and installing it.
If you click on the link, you will be asked to enable the installation of unknown third-party applications and it will tell you how to do it. If the user continues with the installation they will be infectedIf you don’t, absolutely nothing will happen.
The problem is that many people have already disabled the possibility of installing third-party applications in the Android settings, so they could be practically infected as soon as they click on the link and run the download.
It is a very dangerous malware because it is dedicated steal banking and payment information by placing overlays in banking apps, payment and legitimate cryptocurrencies.
It will also steal our contact list and spread through them by sending messages from phishing.
This malware is affecting countries such as Spain, Germany, Poland, Hungary, the United Kingdom and Switzerland, but also Australia and Japan, so it is already practically worldwide.