{"id":16972,"date":"2018-03-22T08:00:44","date_gmt":"2018-03-22T12:00:44","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=16972"},"modified":"2022-04-28T08:54:11","modified_gmt":"2022-04-28T12:54:11","slug":"android-malware-facebook-phishing-scam","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/android-malware-facebook-phishing-scam\/","title":{"rendered":"Beware of New Android Malware That Steals Your Facebook Password"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The team at Google works hard to prevent malicious Android apps from entering the Play Store, but occasionally something will slip by the gatekeepers. A new threat to Android smartphones, dubbed as \u2018GhostTeam\u2019 <\/span><a href=\"https:\/\/thehackernews.com\/2018\/01\/facebook-password-hacking-android.html?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Security+Blog%29&amp;_m=3n.009a.1665.kk0ao0bzne.10b0\"><span style=\"font-weight: 400;\">has been discovered<\/span><\/a><span style=\"font-weight: 400;\">. The malware was found in over 50 different Android applications and targeted users of Facebook.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Keeping yourself protected against malicious malware can be a difficult task. One way to prevent an infestation on your phone is to use <strong>dfndr security\u2019s Full Virus Scan feature<\/strong> on your Android phone, which scans for viruses, malicious content, or infected apps even checking your SD card. <\/span><\/p>\n<p><center><a href=\"https:\/\/app.appsflyer.com\/com.psafe.msuite?pid=Blog&amp;c=Beware_of_New_Android_Malware_That_Steals_Your_Facebook_Password\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-9829 size-full\" src=\"http:\/\/cdn.blog.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1.jpg\" alt=\"\" width=\"353\" height=\"79\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1.jpg 353w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1-300x67.jpg 300w\" sizes=\"auto, (max-width: 353px) 100vw, 353px\" \/><\/a><center><\/center><\/center><span style=\"font-weight: 400;\"><br \/>\nNow that you have a way to employ a defense, learn more about this Android malware that\u2019s out there infecting devices.<\/span><\/p>\n<p><b>Read More:<\/b> <a href=\"https:\/\/www.psafe.com\/en\/blog\/all-about-trusted-contacts-feature-facebook\/\"><span style=\"font-weight: 400;\">All About the Trusted Contacts Feature on Facebook<\/span><\/a><\/p>\n<p><b>Dole Out Administrator Permissions Selectively<br \/>\n<\/b><span style=\"font-weight: 400;\">In the specific instance of the GhostTeam malware, its developers took advantage of both your device\u2019s permissions and your trust. You download and install a supposedly safe app, which then downloads malware in the background and requests administrative access to your device. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Take time to read any Android prompts which ask for specific permissions. For example, consider why a calendar application would require access to your microphone or camera &#8211; it typically wouldn\u2019t need this to function. Be careful of what permissions granted to your apps and if one asks to become a device administrator deny the request. Apps with device administrator privileges can prioritize themselves and take control of your device.<\/span><\/p>\n<p><b>Two-Factor For Enhanced Security &#8212; The Smart Way to Go<br \/>\n<\/b><span style=\"font-weight: 400;\">Gaining administrative access to your device was only the first step for GhostTeam. Once the needed permissions were obtained, the device would attempt to phish the user through a barrage of Facebook login requests. Phishing attacks are used to trick users into giving sensitive information to a brand or service they believe to be trustworthy but is only being spoofed for malicious intentions.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While it would be impossible to be completely aware of every trap out there on the web, we should be as alert as possible to potential phishing scams. Some phishing scams are incredibly realistic and fool even the best of us. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is where two-factor authentication can help. Adding this to your <\/span><a href=\"https:\/\/www.facebook.com\/help\/148233965247823\"><span style=\"font-weight: 400;\">Facebook account is easy,<\/span><\/a><span style=\"font-weight: 400;\"> and try to do the same for every account if you can, so hackers won\u2019t be able to get in with just your password. Two-factor authentication ensures you have two pieces of information; in most cases, this includes your password and a one time code texted or emailed to your device of choice.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Consider security practices like two-factor authentication, watch what you download, and you should be quite safe. If you believe that you may have already been infected, be sure to download a security app or use the one you already have to scan your phone.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A series of malicious apps have been discovered in the Google Play Store. How can you keep your information safe?<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[162,259,182,358,249],"class_list":["post-16972","post","type-post","status-publish","format-standard","hentry","category-security","tag-antivirus","tag-hackers","tag-malware","tag-protection","tag-security"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/16972","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=16972"}],"version-history":[{"count":3,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/16972\/revisions"}],"predecessor-version":[{"id":17926,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/16972\/revisions\/17926"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=16972"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=16972"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=16972"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}