{"id":8388,"date":"2017-02-27T09:00:17","date_gmt":"2017-02-27T14:00:17","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=8388"},"modified":"2017-03-06T17:34:35","modified_gmt":"2017-03-06T22:34:35","slug":"attacks-mobile-banking-apps-look","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/attacks-mobile-banking-apps-look\/","title":{"rendered":"Attacks on Mobile Banking Apps to Look Out For"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Mobile phones have offered an extremely convenient way to manage your banking at the tip of your fingers. You no longer have to trek on over to the local banking branch to check your balance, deposit checks, or transfer funds. However, there have been immense security repercussions to this new innovation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DFNDR\u2019s Applock feature can be a lifesaver for you and your social media. Lock your Facebook, Twitter, Texts, Contacts, Images, and all other apps you want with a password, even if the device itself is unlocked. Also, the user is able to select which apps he wants to protect. This is a great feature to take advantage of, because it guarantees that all of your conversations and sensitive data are for your eyes only. Plus, no one will be able to gain access to your various accounts and use them for malicious purposes. Click here to protect your apps with a password now:<\/span><\/p>\n<p><center><a href=\"psafe:\/\/launch\/vault\" rel=\"attachment wp-att-7755\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-7755\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/02\/deeplink_vault.png\" alt=\"deeplink_vault\" width=\"300\" height=\"78\" \/><\/a><\/center><span style=\"font-weight: 400;\"><br \/>\nHackers have found clever ways to implement malware into a variety of software in your smartphone. Here are a few ways they are performing their antics.<\/span><\/p>\n<p><b>Black Jack Free<\/b><\/p>\n<p><span style=\"font-weight: 400;\">This sounds like it\u2019s a pretty innocent game, but there is a pretty vicious virus that lies behind the curtains. According to Lookout, this malicious game has infected more than 5000 users. This same report noted that the hackers who infiltrated this game did so to install a secondary malicious Play store duplicate app and to install phishing popups on your device. Not only did this malware attack banks, but social media applications such as Twitter and Facebook were also under attack.<\/span><\/p>\n<p>The Lookout team released a statement in regards to their investigation: \u201cYou can compare this kind of mobile malware with ATM skimmers \u2014 the devices criminals install over an ATM\u2019s card reader in order to steal a person\u2019s card information. It\u2019s a layer of technology that siphons off data while the individual goes about their regular banking business.&#8221;<\/p>\n<p><b>Faketoken and Tordow<\/b><\/p>\n<p><span style=\"font-weight: 400;\">These are two Trojans that were massively popular in 2016. While Tordow was hidden in many popular apps, Faketoken mimicked a banking app\u2019s log in screen so that hackers could get a person\u2019s banking information. Both of these Trojans get root access so that they can take control of your device. That\u2019s why you should run a full virus scan on your device whenever you download a new app, to be sure that malware hasn\u2019t infected the app. Click here to run a full virus scan on your phone or tablet:<\/span><\/p>\n<p><center><a href=\"psafe:\/\/launch\/antivirus_quick\" rel=\"attachment wp-att-7428\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-7428\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/01\/Security-Scan.png\" alt=\"Security Scan\" width=\"300\" height=\"78\" \/><\/a><\/center><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers are attacking banking apps in the most unexpected ways. <\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[],"class_list":["post-8388","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/8388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=8388"}],"version-history":[{"count":0,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/8388\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=8388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=8388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=8388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}