Password-Stealing Malware Targets Android Devices

PK Tech Blog Image

There is a new type of malware that is spreading quickly. FluBot malware specifically targets Android devices, aiming to steal passwords, bank details, and other sensitive information.

How does FluBot work?

When FluBot is employed, infected users are exploited as the malware spreads to their contacts. FluBot uses text messages claiming to be from a delivery company that asks users to click a link to track package delivery. When the user clicks the link, it installs an application claiming to help the user track delivery. In reality, the application installs malware that downloads onto the user’s device to steal information.

After FluBot is installed, it can access the device address book, which it then uses to continue the spread of its malware through text messages to the victim’s phone contacts. Thus, the cycle continues.

Helpful Tips for FluBot Malware

  1. Never click unconfirmed links in text messages.
  2. If a text message seems odd (i.e., click to track your Amazon delivery but can’t remember anything you ordered from Amazon), don’t click. Verify first. 
  3. Most text message attacks claim to come from DHL delivery service, but FluBot has also used other notable names, including Argos, Amazon, and Asda. 
  4. Android device users should use extra caution, but don’t think that other devices are exempt from text message attacks.
  5. Click here for information on how to identify and remove FluBot malware.
  6. If you think you’ve been attacked, forward the message to 7726, a free spam-reporting service provided by phone operators. Delete the message after reporting it.

Ransomware, malware, and phishing attacks are maintaining record growth. Recently, we talked about how to reduce spam and scam calls on our blog. For more tips and the latest cybersecurity and IT news, follow our blog

If you or someone you know could benefit from managed IT services, contact the PK Tech team here