{"id":1018,"date":"2017-09-21T23:06:54","date_gmt":"2017-09-21T20:06:54","guid":{"rendered":"https:\/\/community.virtono.com\/?p=1018"},"modified":"2017-09-21T12:51:34","modified_gmt":"2017-09-21T09:51:34","slug":"new-android-banking-trojan-on-sale-red-alert-2-0","status":"publish","type":"post","link":"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/new-android-banking-trojan-on-sale-red-alert-2-0\/","title":{"rendered":"New Android Banking Trojan on Sale: RED ALERT 2.0"},"content":{"rendered":"<p>Recently we&#8217;ve seen a disturbing amount of rising in banking trojans like FakeToken, Svpeng, and BankBot, they are presenting a significant menace to everyone storing their login credentials and relevant personal data.<\/p>\n<p>A new banking trojan has come to light security researchers at SfyLabs have now discovered a new Android banking Trojan that is being rented on many dark web&#8217;s Hacker chat rooms for 500$ a month. Dubbed Red Alert 2.0, it&#8217;s been found out that this trojan has been written from scratch and is currently affecting around 60 banking and social media apps. The way it works is that whenever the potential victim opens up any of these apps the trojan takes over and asks the victim to re-enter their credentials and this is when that data is stolen.<\/p>\n<p>The major source of distribution of this trojan is online hacking forums since last few months and its\u00a0creators are continuously working to make it better and worse for us.<\/p>\n<p>It is armed with the capability to block incoming calls from your bank and is also capable of waltzing past two-factor authentication systems by intercepting SMS text messages that the smartphone receives and passing them onto hackers.<\/p>\n<h3>Precautions to take Against such Android Banking Trojans<\/h3>\n<p>The best way to prevent yourself from being a victim of one such\u00a0mobile banking Trojan\u00a0is to avoid downloading apps via third-party app stores or links provided in SMS messages or emails.<\/p>\n<p>Just to be on the safer side, go to Settings \u2192 Security and make sure &#8220;Unknown sources&#8221; option is turned off on your Android device that blocks installation of apps from unknown sources.<\/p>\n<p>Most importantly, verify app permissions before installing any app, even from official Google Play Store, and if you find any application asking more than what it is meant for, just do not install it.<\/p>\n<p>It is always a good idea to install an anti-virus app from a reputed vendor that can detect and block such Trojan before it can infect your device.<\/p>\n<p>Also, always keep your system and apps up-to-date.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently we&#8217;ve seen a disturbing amount of rising in banking trojans like FakeToken, Svpeng, and BankBot, they are presenting a significant menace to everyone storing their login credentials and relevant personal data. A new banking trojan has come to light security researchers at SfyLabs have now discovered a new Android<\/p>\n","protected":false},"author":3,"featured_media":1020,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[25],"tags":[],"class_list":["post-1018","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-and-technology-news"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/09\/red-alert-troyano-android.jpg?fit=634%2C309&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ISfL-gq","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":984,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/malware-detection-on-your-server\/","url_meta":{"origin":1018,"position":0},"title":"Malware Detection On Your Server","author":"Daniel Draga","date":"June 26, 2017","format":false,"excerpt":"The term malware encompasses a large range of unwelcome software that is designed to damage a computer. A partial list of malware might, for example, include viruses, spyware, Trojan horses, and worms. The rapid proliferation of such software is enough to concern users of all levels, from novices to seasoned\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/06\/What-is-Malware.jpg?fit=600%2C300&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/06\/What-is-Malware.jpg?fit=600%2C300&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/06\/What-is-Malware.jpg?fit=600%2C300&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":988,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/digitally-fingerprint-your-files\/","url_meta":{"origin":1018,"position":1},"title":"Digitally Fingerprint Your Files","author":"Daniel Draga","date":"June 26, 2017","format":false,"excerpt":"There are a number of good reasons to keep an eye on your server security. Few sysadmin types absorb the necessary security knowledge required to keep their infrastructure safe without enthusiasm and effort. If you\u2019re anything like me, there have been a few bumps along the way, such as when\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/06\/digital_fingerprint_0.jpg?fit=370%2C370&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":799,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/android-onecase-study\/","url_meta":{"origin":1018,"position":2},"title":"Android One:Case Study","author":"Daniel Draga","date":"December 11, 2016","format":false,"excerpt":"When Google\u2019s senior vice president of Android, Chrome and Apps, Sundar Pichai arrived in India to launch the first Android One handsets in the world, he opened a new chapter in the history of Android. For the first time, a worldwide initiative was being taken by a major OS player\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/12\/Android_One_devices_944.jpg?fit=512%2C288&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":2136,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/linux-encryption-how-to-secure-your-data\/","url_meta":{"origin":1018,"position":3},"title":"Linux encryption: How to secure your data","author":"Shreyash Sharma","date":"December 12, 2020","format":false,"excerpt":"Sales figures, strategy papers, payrolls and private records, pictures, account data, and passwords do not belong in the wrong hands. This article shows where encryption is necessary and how it is best implemented. Encryption is technically not a problem at all. There are several reliable methods under Linux for protecting\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/12\/linux-encrypting-tools.png?fit=560%2C315&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/12\/linux-encrypting-tools.png?fit=560%2C315&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/12\/linux-encrypting-tools.png?fit=560%2C315&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":763,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/fighting-mobile-data-security-hurdles\/","url_meta":{"origin":1018,"position":4},"title":"Fighting  Mobile Data Security Hurdles","author":"Daniel Draga","date":"November 18, 2016","format":false,"excerpt":"As mobile devices and applications continue to flood the business landscape, the security holes that these consumer devices pose put your entire enterprise network at risk. Fortunately, there are a number of steps you can take to not only heighten your mobile data security, but overcome common hurdles. In this\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/mobile-security.jpg?fit=590%2C391&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/mobile-security.jpg?fit=590%2C391&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/mobile-security.jpg?fit=590%2C391&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":1174,"url":"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/yahoos-big-data-engine-will-be-open-source-project\/","url_meta":{"origin":1018,"position":5},"title":"Yahoo&#8217;s Big Data Engine will be open source project","author":"Shreyash Sharma","date":"October 26, 2017","format":false,"excerpt":"Since 2016,\u00a0Yahoo\u00a0belongs to the Verizon Group, and to Oath, the Verizon Digital Network.\u00a0Oath now puts Yahoos's Big Data Engine Vespa under Java into an open source license. According to the announcement of\u00a0the Java project\u00a0Vespa\u00a0by Yahoo, it is intended to make it easier for software administrators to create applications that filter\u2026","rel":"","context":"In &quot;IT News&quot;","block_context":{"text":"IT News","link":"https:\/\/www.virtono.com\/community\/category\/internet-and-technology-news\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/10\/Vespa-Logo.jpg?fit=720%2C470&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/10\/Vespa-Logo.jpg?fit=720%2C470&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/10\/Vespa-Logo.jpg?fit=720%2C470&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/10\/Vespa-Logo.jpg?fit=720%2C470&ssl=1&resize=700%2C400 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/1018","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/comments?post=1018"}],"version-history":[{"count":2,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/1018\/revisions"}],"predecessor-version":[{"id":1021,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/1018\/revisions\/1021"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media\/1020"}],"wp:attachment":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media?parent=1018"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/categories?post=1018"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/tags?post=1018"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}