{"id":20766,"date":"2020-07-07T14:27:18","date_gmt":"2020-07-07T18:27:18","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=20766"},"modified":"2022-04-27T14:50:14","modified_gmt":"2022-04-27T18:50:14","slug":"fakespy","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/fakespy\/","title":{"rendered":"\u201cSmishing\u201d Malware Uses Missed-Delivery Notification To Lure Victims"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">PSafe\u2019s dfndr lab has uncovered details about \u201cFakespy\u201d, malware that has a history of enticesing\u00a0 victims by promising information about a missed delivery via an SMS message. Phishing via SMS is also known as \u201cSmishing.\u201d And a third type of trap, \u201cVishing,\u201d uses voice data. \u2026Now you know.\u00a0 We hope these terms serve as a reminder that hackers are always inventing new approaches for getting your personal information, and they\u2019ll use any avenue open to them. Fakespy also shows that old malware code and scams are constantly being refurbished or re-used in new venues.\u00a0<\/span><\/p>\n<h3><b>How Fakespy Entices Users<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\u201cHackers are always looking for our soft spots,\u201d remarks Emilio Simoni, PSafe\u2019s dfndr lab Research Director \u201cand FakeSpy uses the natural excitement people have for receiving a package of some kind. Most people immediately want to know who sent you something, and what you might have received.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Typically, this malware loads via a fake app posing as the website for your country\u2019s mail service \u2014 in America, the USPS; in England, the Royal Mail, and so on.\u00a0 The fake app is designed to look like the real thing, and once it downloads and the fake transaction is completed, it actually passes the user on through to the real USPS site, to avoid detection. Meanwhile, the malware has loaded, and a broad host of information stealing is underway: financial information, account information, app information, contact lists \u2014 Fakespy can even read other SMS messages.\u00a0 And, like most malware, Fakespy immediately begins its work to replicate itself by sending offers to its victims\u2019 contact lists.<\/span><\/p>\n<h3><b>Permissions Required Provide a Warning\u2026<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\u201cIt\u2019s a very sophisticated and still evolving malware,\u201d Simoni warns, \u201cthe people behind it have been refining its design for some time now.\u201d One strong warning-sign is that the app asks for extensive permissions \u2014 but many users have grown accustomed to approving these for sites they trust. \u201cIf the enticement of a missed package works and the fake mail-delivery site is compelling, it\u2019s easy to see how victims can get manipulated,\u201d Simoni says.<\/span><\/p>\n<h3><b>What Can You Do To Stay Safe?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\u201cThe first thing to remember is that hackers are using every venue available to them to get their software on your devices,\u201d Simoni explains. \u201cAdd smishing and vishing to your malware vocabulary and keep in mind that callers and texters may not always be who they appear to be\u2014 or say they are.\u201d\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However hard you work to stay informed, a good protection solution \u2014 with a team behind you, is almost essential to stay one step ahead of all the various threats evolving in the digital landscape.\u00a0\u00a0<\/span><\/p>\n<h3><b>The Best Protection, For The Worst Threats<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">An excellent way to protect yourself is to always keep a security installed on your phone. <\/span><span style=\"font-weight: 400;\">dfndr security offers a full suite of security capabilities that can protect you not only from digital threat, but from everyday thieves as well. <strong><a href=\"https:\/\/go.onelink.me\/U4Bc?pid=MKT_BLOG_US&amp;amp;c=fakespy\">Click here to install for free.<\/a><\/strong><\/span><\/p>\n<p><span style=\"font-weight: 400;\">(Remember, they steal devices and data too!)\u00a0<\/span><\/p>\n<p><b>These are the features dfndr security Pro offers to protect you:<\/b><\/p>\n<p><b>Safe App Installer: <\/b><span style=\"font-weight: 400;\">AUTOMATICALLY protects you from malware and apps known to have had data breaches \u2014 before you install them.<\/span><\/p>\n<p><b>App Privacy Scan:<\/b><span style=\"font-weight: 400;\"> You can locate on a map where your app data is going and how it might be used by third-parties.<\/span><\/p>\n<p><b>Unlimited Identity Theft Reports: <\/b><span style=\"font-weight: 400;\">These reports provide an \u201couter-perimeter\u201d defense, looking out for privacy vulnerabilities beyond your own device. These reports reveal if any of your information has been leaked, with a one-click check of a database with over 4 billion compromised credentials<\/span><b>.\u00a0<\/b><\/p>\n<p><b>Anti-theft Protection: <\/b><span style=\"font-weight: 400;\">Protects against physical loss that leads to data loss: in case of theft or loss of your device, you can lock it down remotely, find the phone on a map; or, activate a loud alarm to find it nearby. You can also get a picture of the thief, and wipe the phone of your personal data.<\/span><\/p>\n<p><b>Ad-Free: <\/b><span style=\"font-weight: 400;\">As an extra bonus, Pro is totally ad-free.<\/span><\/p>\n<h3><b>Stay Safer!<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">With <a href=\"https:\/\/go.onelink.me\/U4Bc?pid=MKT_BLOG_US&amp;amp;c=fakespy\"><strong>dfndr security<\/strong><\/a> in your toolbox, the rest is a matter of staying as aware as you can.\u00a0 Follow a few simple rules to avoid and minimize digital damage:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Take extra care with any link from an unknown source \u2014 and be extra wary if it promises a surprise of some kind. Check your curiosity!<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Don\u2019t click on any links sent to you via email or SMS from unknown people.\u00a0 And if you get a link from somebody you know, ask: WHY would he \/ she send me this?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Only download or install software from trusted sources!<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Make sure you do regular backups on your machines!<\/span><\/li>\n<\/ul>\n<p><b>Be careful, and we\u2019ll keep you informed as always, whenever we hear more about Fakespy, or any other major threats!<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It has one small side-benefit: it may enhance your vocabulary of new types of hacks and malware. Other than that, it fully earns the name \u201cmalware.\u201d<\/p>\n","protected":false},"author":83,"featured_media":20767,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[12445,12443,12248,12444,12041,12442,182],"class_list":["post-20766","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-alert","tag-android-malware","tag-dfndr-lab","tag-dfndr-news","tag-dfndr-security","tag-fakespy","tag-malware"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/20766","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=20766"}],"version-history":[{"count":4,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/20766\/revisions"}],"predecessor-version":[{"id":20916,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/20766\/revisions\/20916"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media\/20767"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=20766"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=20766"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=20766"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}