Your IP address () and location () are vulnerable to tracking. Conceal your identity now. Install dfndr vpn.
Android Trojan Posing as Flash Player Targets Customers of Major Banks

Android Trojan Posing as Flash Player Targets Customers of Major Banks

The malware even bypasses SMS two-step verification

GM Bot is sweeping up data in seconds as users of 90 major banks across the U.S. and Europe continue to be the target for this information heist. This malware has the ability intercept SMS messaging to include confiscating banking authorization pins and other sensitive information. This trojan is considered extremely dangerous which reinforces the need to have a robust anti-virus present on your device. Ensure your banking details stay private by clicking below to scan your device for threats.

Run Virus Scan

The malware derives from a fake flash player app, available for the latest and previous versions of Android, that displays a screen overlay on top of all apps to follow making it merely impossible for users to identify. In other words, the app may be closed or cancelled but the malware will remain active in the background.

As an added inconvenience, users are unable to open favorite apps like Instagram, Google Play, Whatsapp and Snapchat unless credit/debit card information is entered. At this stage, it’s unclear how many users have been affected.

malware-overlay

An anti-virus is highly recommended for an extra layer of protection that could determine whether your device is affected by 3rd party threats or safe. Click below to start scan.

Run Virus Scan