TeaBot, a new Android malware targets two-factor banking apps
A new malware called TeaBot ramps up Android and sneaks into smartphones to absorb our banking data. TeaBot malware is indeed capable of reading and copying some particularly sensitive content.
New TeaBot malware on Android
As you probably know, during an online purchase, it often happens that the buyer’s bank sends a code via SMS to validate the transaction in progress. One way to “guarantee” payments, which will however be reviewed and corrected very soon.
Meanwhile, a new malware is raging on Android, particularly trying to recover the banking data of its victims in various European countries. A malware called TeaBot and discovered by Cleafy. Specifically, TeaBot will hide behind very famous names (VLC MediaPlayer, DHL, UPS, etc.) to settle on the victim’s smartphone as an Android service. In the background, the latter will analyze the user’s actionstaking care to hide its icon, so as to make itself invisible.
The malware then reads and analyzes the bank’s SMS messages, containing single-use codes. Of course, it is also capable of stealing the IDs and credit card numbers of its victims, all in complete discretion. It is therefore able to carry out various banking operations independently, much to the chagrin of its victims.
The good news is that TeaBot is not present on the Google PlayStorebut instead spreads through alternative linksasking you to download a .apk file. Currently, TeaBot targets around 60 European banks, in Spain, Italy, Belgium and the Netherlands, and the malware is translated into several languages.