Jump to content
  • Sign Up
×
×
  • Create New...

ToxicPanda Banking Trojan Infects Over 1,500 Android Smartphones, Targets 16 Banks: Report


Recommended Posts

  • Diamond Member

This is the hidden content, please

ToxicPanda Banking ******* Infects Over 1,500 Android Smartphones, Targets 16 Banks: Report

ToxicPanda — a banking ******* that is believed to be in an early stage of development — has been detected by security researchers in Europe and ****** America. It is believed to be derived from another banking ******* detected in 2023, and is used to remotely take over accounts on compromised phones, allowing attackers to transfer funds while bypassing security measures aimed at stopping suspicious transactions. ToxicPanda was reportedly found on over 1,500 devices, while targeting users of 16 banking institutions.

Researchers at Cleafy’s Threat Intelligence

This is the hidden content, please
a new Android malware in October that they previously detected as TgToxic, another banking ******* that was actively used in Southeast Asia and was identified by the group last year. The researchers found that the new sample did not contain capabilities from TgToxic, and that the code was not similar to the original *******.

The ToxicPanda ******* is disguised as popular applications
Photo Credit: Cleafy

 

As a result, the researchers started to track the newly detected remote access ******* (RAT) as ToxicPanda and warns that the malware can lead to account takeover (ATO) after a victim’s device is infected. Cleafy’s Threat Intelligence team also says that by opting for manual distribution (sideloading, using social engineering), threat actors (TA) can circumvent a bank’s security measures that are used to keep users safe.

In order to access almost all information on a user’s device, the malware exploits the accessibility service on Android, allowing it to capture data from all apps. It is also capable of sidestepping two-factor authentication (such as OTPs) by capturing the contents of the screen. 

The creators of the ToxicPanda malware are ******** speakers, according to the researchers. Over 1,500 devices were infected with the ToxicPanda ******* and users from Italy were the most impacted — more than 50 percent of all infected devices. Other impacted locations include Portugal, Spain, France, and Peru. Customers of 16 banks were reportedly targeted by the TAs using the ToxicPanda *******.

The researchers also point out that current antivirus solutions have ******* to detect these threats, which suggests the need for a “proactive, real-time detection system”. A botnet of infected devices was also spotted in use in Europe and ****** ********* countries, which suggests that the ********-based TAs are now turning their attention to other markets. 

For the latest tech news and reviews, follow Gadgets 360 on

This is the hidden content, please
,
This is the hidden content, please
,
This is the hidden content, please
,
This is the hidden content, please
and
This is the hidden content, please
. For the latest videos on gadgets and tech, subscribe to our
This is the hidden content, please
. If you want to know everything about top influencers, follow our in-house
This is the hidden content, please
on
This is the hidden content, please
and
This is the hidden content, please
.

Vivo Y19s Price, Availability Announced; Comes With 5,500mAh Battery, 50-Megapixel Camera


*********’s Creed Shadows Will Take ‘New Direction’ With Modern-Day Story, Says Ubisoft




This is the hidden content, please

#ToxicPanda #Banking #******* #Infects #Android #Smartphones #Targets #Banks #Report

This is the hidden content, please

This is the hidden content, please

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Vote for the server

    To vote for this server you must login.

    Jim Carrey Flirting GIF

  • Recently Browsing   0 members

    • No registered users viewing this page.

Important Information

Privacy Notice: We utilize cookies to optimize your browsing experience and analyze website traffic. By consenting, you acknowledge and agree to our Cookie Policy, ensuring your privacy preferences are respected.