Expert On News That Dangerous Banking Malware Freely Available Online

The source code for a popular Android banking malware strain has been released online via public forums, raising fears of attacks coming soon, according to Tech Radar. Originally, the operators of the Cerberus trojan – first identified in mid-2019 – attempted to auction off the code to other cybercriminal syndicates, but they have now abandoned the material online for anyone to use. As a result, researchers have witnessed an immediate spike in the number of mobile infections, as cybercriminals harness the complex and sophisticated Android malware to defraud users across Europe.

Experts Comments

September 21, 2020
Jake Moore
Cybersecurity Specialist
ESET
Attacks on mobile phones are making serious headway on the malware scene and when source code like this surfaces, it ignites this trend even more. When source code to banking malware is leaked, many individuals may be targeted. Android users are reminded to remain aware of this threat, and must always remember to only use reputable app stores when downloading and installing new apps. It’s also important to keep devices up to date with the latest updates and security patches to help thwart.....Read More
Attacks on mobile phones are making serious headway on the malware scene and when source code like this surfaces, it ignites this trend even more. When source code to banking malware is leaked, many individuals may be targeted. Android users are reminded to remain aware of this threat, and must always remember to only use reputable app stores when downloading and installing new apps. It’s also important to keep devices up to date with the latest updates and security patches to help thwart the increase in attacks we are already seeing. Nevertheless, it bodes well that this particular malware did not auction well, suggesting that threat actors may not always be willing to pay for their malware as a service.  Read Less
What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.