$hide=post

Government Alert To Android Users

SHARE:

Be Aware Of Using A Banking Scam App!

 

Government Alert To Android Users

An Official Alert To Android Users Against Phishing Scam

As per the country's cybersecurity experts, scammers have been focusing on banking clients in India who use banking apps for online transactions.

These scammers use a novel phishing technique to gather delicate info of the victims, such as their internet banking credentials, mobile number, and OTP to carry out fraudulent transactions.

This malicious exercise is being carried out using the malware referred to as Drinik which tries to steal the online banking details of the users.

Including both, the private and public sector banks, the malware campaign is claimed to be targeting over 27 Indian banks.


How The Phishing Attack Process Starts?

It all starts with the user receiving an SMS with a link to a phishing website that appears to be of an income tax department.

The user is then asked to enter his details and download the malicious apk file claiming to be an official income tax department app, to complete the so-called fake verification.


How The Drinik Malware Attacks?

As per the advisory by Indian Computer Emergency Response Team or CERT-In, Drinik Android malware is spreading by disguising itself as an Income Tax refund.

This banking trojan appears to users as an income tax refund screen and persuades them to enter their delicate banking data to get a tax refund.


What Does The Malware App Do On My Phone?

After the user unknowingly installs the so-called fake income tax app, it asks him to grant it some mandatory permissions like SMS, call logs, contacts, and so forth.

Moreover, if the user happens to miss out on entering his details on that fake website earlier, then he'll be shown the same form screen and will be asked again to enter his details to proceed.


How This Malware App Works

After the user enters his personal details in the form, the screen shows a message stating that there is some income tax refund amount that can be transferred to the user's bank account.

So naturally, the user clicks on the transfer button because he would definitely want to have money. But when he does try to proceed and click the transfer button, the new screen appears which shows the fake error message, while in the background all the personal details that he entered are being sent to the scammer.

Now here comes the mind-boggling part. The details that were sent to the scammer will now be used to generate the bank-specific mobile banking screen and will be rendered back to the user's device to give a personalized experience, giving an impression as if the user has definitely logged on to his actual online account.

At this point in time, the user is requested to enter the mobile banking credentials which then gets captured by the attacker.



What Overall Data Gets Stolen?

The data that Drinik steals include your full name, PAN card details, Aadhaar card details, Your full address, date of birth, registered mobile number and email address, and also your financial details like the account number of yours, the IFSC code, CIF number, your debit/credit card number, expiry date, CVV and PIN.


How To Stay Safe From Such Banking Fraudsters?

To make sure you do not fall in the hand of such scammers, it is better to follow some of the best practices.


Best Safety Practices

  • Do not install apps from any third-party sites using their apk files.
  • Disable the Unknown Sources option in your android devices, so that there is a reduced risk of you mistakenly installing any apps in the background.
  • When required only search and download apps from Google's PlayStore.
  • Prior to downloading or installing any apps on your device, even if you are doing so from Google Play Store, always review the app details, number of downloads, user reviews, comments, etc.
  • Most importantly, before using any app blindly always do check what permissions does it want to have access to and grant only those permissions which have relevant context for the app's purpose, for e.g. if a photo editing app wants to access your phonebook and phone's microphone, then it means something is definitely going crazy around here
  • Don't trust any website only by its appearance, for e.g. if the webpage has designs, patterns, icons, or logos similar to a government website then it doesn't necessarily mean it's an authentic government site. Always check the complete website URL to check its authenticity.

COMMENTS

Top Deals For Today

Name

Facts,4,Fun,12,Marketing,3,Money,16,News,56,Reviews,15,Security,23,SEO,5,Tech,34,Web,5,
ltr
item
Homies Hacks: Government Alert To Android Users
Government Alert To Android Users
Be Aware Of Using A Banking Scam App!
https://1.bp.blogspot.com/-TibsRs2Ot3A/YUxnv6fLNqI/AAAAAAAAEW0/X58EZoBRUr88apqa_-zYyPVH-4xAtddDQCLcBGAsYHQ/w640-h374/Government-Alert-To-Android-Users.jpg
https://1.bp.blogspot.com/-TibsRs2Ot3A/YUxnv6fLNqI/AAAAAAAAEW0/X58EZoBRUr88apqa_-zYyPVH-4xAtddDQCLcBGAsYHQ/s72-w640-c-h374/Government-Alert-To-Android-Users.jpg
Homies Hacks
https://www.homieshacks.com/2021/09/government-alert-to-android-users.html
https://www.homieshacks.com/
https://www.homieshacks.com/
https://www.homieshacks.com/2021/09/government-alert-to-android-users.html
true
5792707671424551706
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content