Android Malware, Android.banker.A9480 Targets 232 Banking Apps Report By Quick Heal

Quick Heal is reporting that 232 banking applications across the world of an Android malware are a bad sight. Some of these Indian applications are also. Android.banker.A9480 Trojan malware can steal the user’s personal data and also notice the user’s incoming and outgoing calls. Along with this, SMS, contact list, and login data can upload to another unsafe server. Quick Heal also said that this trojan can also target the crypto currency app on the user’s phone besides the banking app.

Quick Heal released a list of all the Indian banking applications in which this Android.banker.A9480 has been attacked by Trojan malware, including Axis Mobile, HDFC Bank Mobile Banking, SBI Anywhere Personal, HDFC Bank Mobile Banking Lite, IDBI Go Mobile , IDBI Bank  m Passbook, I Mobile by ICICI Bank, IDBI Bank Mobile Plus, Union Bank Mobile Banking, and Union Bank Commercial Clients A It’s on the target.Android.banker.A9480

It was also reported by Quick Heal that Android.banker.A9480 malware comes via the fake flash app at the third party store. This malware attacks itself through the cyber criminal flesh player. If this application is downloaded by the user one time, then it is repeatedly asked to activate the administrative rights, because, after administrative rights activation, this app can do whatever that it wants in your mobile. It was also reported in the report released by Quick Heal that this application will continue to send you pop-up until you activate the administrative rights for this app.

After this malware application is installed on your smartphone, its icon disappears. This application does its work from the background.

The process of working for this malware application is something like this. First of all, this application searches for all the 232 banking applications which are aimed at this. If any of those 232 banking applications are found, then the malware application sends a fake notification to the user who looks like your original banking application.

For You 

If someone clicks on the notification, then you will tell to enter the login ID and password there. If a user enters the login ID and password there, this data is stolen, meaning that the malware application is stored in Sarver.

Along with this, it was also told by Quick Heal that malware can also send and receive SMS receipts. For this reason, this application can also tamper with two-factor authentication of your banking transaction.

About Pradeep Singh

I Like to Learn and Share all about Technology, I do Blogging With Passion, I Want everyone Be Logical & Technical. I will always Help You

View all posts by Pradeep Singh →

Leave a Reply By Social Media or Entering Your Email id