A new BRATA variant discovered on Android can now wipe out all phone's data
By MYBRANDBOOK
Android is the most popular operating system in the world, with more users than any other, thus becoming a juicy target for cyber-criminals. The platform has been targeted time and time again over the years with varying degrees of success.
One malware that has proved to be particularly difficult to shake off has been BRATA, a remote access trojan that has been used to steal banking details in the past. And now to make things worse, an updated version of the malware has been discovered in the wild, and it has a few new capabilities - including the ability to wipe your phone’s data as a kill-switch.
A report from computer security firm Cleafy outlines how this new BRATA variant operates. In short, it has now been updated to attempt to evade antivirus scanners, keylog, and factory reset the smartphone. There are different variants of BRATA aimed at different audiences, and it targets e-banking users in the UK, Poland, Italy, Spain, China, and Latin America.
BRATA.A added the GPS tracking feature and factory reset ability, and BRATA.B has the same features plus more obfuscated code and tailored overlay pages for specific banks to capture login details. The solution used to deploy the malware on smartphones through BRATA.C is to use a primary app that can then download and install a secondary app with the malware.
So how to avoid being infected? The best way to avoid this is to be careful about which apps you provide accessibility or admin access to. BRATA makes use of accessibility service permissions to view what’s on your screen, including screenshots and user keystrokes. The biggest change though is the introduction of a remote factory reset, which appears to be executed once a user’s banking details have been successfully stolen. It is also executed when BRATA suspects it is being run in a virtual environment. This can only be done if you give the app administrator access on your phone.
Typically, the best way to avoid getting caught out is to never give accessibility permissions or administrator permissions to any app and to only install apps from recognized distribution platforms.
Microsoft to build a new data centre to support Thailand's tec
Microsoft has revealed intentions to construct a regional data centre as w...
SAP launches cloud services to help Indian scaleups innovate m
SAP at SAP unveils now "GROW with SAP for Scaleups," a new cloud service d...
Denodo and Sonata form alliance to unlock data-to-value creati
Denodo and Sonata Information Technology India Limited (SITL) have annou...
Google Play Store will now let users download two apps simulta
Google Play Store now lets users download two apps simultaneously. While a...
RAMCO SYSTEMS Ltd.
DELL TECHNOLOGIES INDIA PVT. LTD.
AMARA RAJA POWER SYSTEMS LTD.
OPTIEMUS INFRACOM
Technology Icons Of India 2023: Rajiv Memani
As Chair of the EY Global Emerging Markets Committee, Rajiv connects e...
Technology Icons Of India 2023: Sunil Gupta
Sunil Gupta is the Co-founder, Managing Partner & CEO of Yotta Infrast...
Technology Icons Of India 2023: Debjani Ghosh
Debjani Ghosh is the first woman president of NASSCOM (the umbrella bo...
PGCIL transforming India with its wide power transmission network
Engaged in power transmission, POWERGRID or PGCIL is a stated owned In...
HPCL is transforming the energy landscape, across the nation and beyond
HPCL is world-class energy company known for caring and delighting the...
RailTel connecting every corner of India
RailTel is an ICT provider and one of the largest neutral telecom infr...
INFLOW TECHNOLOGIES PVT. LTD.
Inflow Technologies is a niche player in the IT Infrastructure Distrib...
IVALUE INFOSOLUTIONS PVT. LTD.
: iValue Info Solutions is a value added distributor, provides solutio...
NETPOLEON SOLUTIONS
Netpoleon Group is a Value-Added Distributor (VAD) of Network Security...