tey
Global Moderator
Global Moderator
Posts: 149
Joined: Thu Oct 01, 2015 11:39 am

Donate BTC of your choice to 1Q5H8v5cKpAeLpJsrgpJpepoT1tfRFUqpR

Contact: Skype

The evolution of Acecard - Trojan-Banker.AndroidOS

Sat Feb 27, 2016 4:37 pm

In many countries, Trojans belonging to the Acecard family are typically distributed with the names Flash Player or PornoVideo, although other names are sometimes used in a bid to imitate useful and popular software.

The Trojan propagates under the guise of a game, but in reality it has no useful functionality. The main goal of this malicious app is to download and install a fully functional modification of the banking Trojan Acecard. Its creators didn’t even bother to make it look like a legitimate application: when the malware is installed from Google Play, the user will only see an Adobe Flash Player icon on the desktop screen.


The cybercriminals are using virtually every available method to propagate the banking Trojan Acecard, be it under the guise of another program, via official app stores, or via other Trojans. This combination of propagation methods, which includes the exploitation of vulnerabilities in the operating system, along with Acecard’s capabilities make this mobile banker one of the most dangerous threats to users.
More on The evolution of Acecard
https://securelist.com/blog/research/73 ... f-acecard/

IT threat evolution in Q3 2015
https://securelist.com/analysis/quarter ... n-q3-2015/

A Trojan-Downloader.AndroidOS.Acecard.b page in Google Play Store
Attachments
acecard_evo_eng_20 (1).png
innovation without permixxion

Return to “Off-Topic”

Who is online

Users browsing this forum: No registered users and 5 guests