{"id":8093,"date":"2017-02-12T09:31:55","date_gmt":"2017-02-12T14:31:55","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=8093"},"modified":"2017-03-06T17:37:14","modified_gmt":"2017-03-06T22:37:14","slug":"hackers-used-legitimate-apps-attack-banks-40-countries","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/hackers-used-legitimate-apps-attack-banks-40-countries\/","title":{"rendered":"Hackers Used Legitimate Apps to Attack Banks in 40 Countries"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Researchers have discovered that hackers are using trusted applications to attack banks and government institutions. In every single attack, hackers exploited legitimate and reputable apps and left no clues in logs or any other data storage devices. So far, attacks have occurred over 140 times and in 40 different countries including the U.S., U.K., Brazil, France and Spain. DFNDR app has the ability to help you locate previously unidentified viruses and keep your devices secure. Given the frequency of these cyberattacks, <\/span><b>it\u2019s more important than ever <\/b><span style=\"font-weight: 400;\">to click below and check if you\u2019re infected:<\/span><\/p>\n<p><center><a href=\"psafe:\/\/launch\/antivirus_quick\" rel=\"attachment wp-att-6203\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-6203\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2016\/11\/BOTAO_PT_0212-3-1.png\" alt=\"BOTAO_PT_0212-3 (1)\" width=\"300\" height=\"78\" \/><\/a><\/center><span style=\"font-weight: 400;\"><br \/>\nDFNDR detects more than 30,000 threats every day in the U.S. alone. Among its many features, the Security Scan lets you quickly verify phone and app files in order to scan for viruses and fix any security breaches. Like the hackers in these recent attacks, the Googligan strain (one of the many viruses detected by DFNDR\u2019s features) has been known to exploit a variety of legitimate software \u2014 posing, for example, as porn sites or 3rd party app stores. <\/span><\/p>\n<p>The virus steals tokens from devices in order to impersonate a user\u2019s Google account and download apps, steal personal photos and files, and post fake app reviews. Since August 2016, it has infected more than 1.3 million Android phones. Within this same period, DFNDR has identified 4,637 strands of the virus and blocked the malware over 3.1 million times.<\/p>\n<p><span style=\"font-weight: 400;\">By scanning your device now with DFNDR, you are ensuring the safety of your private information, personal photos and files, and important apps. Click the button below to run a quick Security Scan:<\/span><\/p>\n<p><center><a href=\"psafe:\/\/launch\/antivirus_quick\" rel=\"attachment wp-att-6203\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-6203\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2016\/11\/BOTAO_PT_0212-3-1.png\" alt=\"BOTAO_PT_0212-3 (1)\" width=\"300\" height=\"78\" \/><\/a><\/center><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s not just third-party apps that can lead to malware on your phone  \u2014 legitimate apps can also be affected. Keep reading to learn how to protect your device.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[],"class_list":["post-8093","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/8093","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=8093"}],"version-history":[{"count":0,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/8093\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=8093"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=8093"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=8093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}