New Android harmful software The fact that you can devastate your bank accounts in seconds are distributed in Europe. As reported Hacker newsThis Trojan called RAT0N and is distributed through harmful applications that pass through the platforms for adults.

The curious thing in this case is that, according to experts in the field of cybersecurity of threat fabric, RAT0N is not based on the existing malicious Android programAccording to experts, this threat developed from scratch and uses a rather complex methodology to gain access to the victims and indicate their attacks.

As already mentioned, the people responsible for the creation of Trojan installed several false websites that refer to the proposed version of Tiktok, dedicated exclusively porn and naked. Therefore, both on the pages and on malicious applications, several links were found in the name “Tiktok18+”.

Thus, when users load these applications, they open the door for this new threat. After the malware enters the Android mobile phones, he deceives victims to resolve Install applications from unknown sourcesThe field then it releases several loads that evade the protection of the operating system and recognize the entrance to the Trojan RAT0N.

RAT0N, new and dangerous malicious software that pursues Android Mobiles

Credit: Sebastian Stam

As soon as the mobile Android was infected with RAT0N, malicious software can indicate a wide range of attacks remotely. For example, bank accounts can be devastated in seconds, Since he can start automatic transfers of money without the consent of the victimsThe field can also steal data related to contact means without contact through the NFC relay attack.

Trojan can also use Android accessibility tools to launch attacks on OptionThis field consists of a set of an entrance screen into financial and banking applications, which are identical to legal (or very similar, at least) to steal accounting data and indicate new fraud.

But the story does not end there. Adopting also allows the victims to deceive, forcing them to believe that their Android mobile phone was blocked by an attack ransomThis field leads to the fact that people transfer large amounts of money to restore access to their device when it was not blocked.

Researchers found several other teams that can be performed remotely. For example, open Facebook or WhatsApp, send SMS, plan contacts, starting the screen transmission or change the screen lock time.

Android applications, infected with this harmful software, initially discovered Czech Republicalthough there are also signs of white, focused on SlovakiaThe field is that this is a threat that is already spreading in Europe, and which can expand quickly.

As always, it is recommended not to install applications from unknown sources if they do not come from really reliable developers. Let’s not forget that Google will start blocking Side load applications not tested from next year, in order to impose an additional level of security on your mobile, so.

Source: Hiper Textual

Previous articleMaleinakana is focused on Alban on Nanazna-Mionistromm Gossakupopok-Bota, who is around?)
Next articleThe cameras of the iPhone 17 Pro explained: all features and what they can do
I'm Ben Stock, a highly experienced and passionate journalist with a career in the news industry spanning more than 10 years. I specialize in writing content for websites, including researching and interviewing sources to produce engaging articles. My current role is as an author at Gadget Onus, where I mainly cover the mobile section.

LEAVE A REPLY

Please enter your comment!
Please enter your name here