Cyber attackers have released advanced malware that silently infiltrates mobile devices without users’ knowledge, taking control and draining bank accounts.
Octo2 Virus
Security researchers at Threat Fabric identified Octo2 as sophisticated mobile malware that captures users’ banking information while entered on-screen, allowing hackers to execute unauthorized transactions.
This malicious code is being distributed through fake Google Chrome and NordVPN applications. Once users download the software, the code conceals itself on the device, evading security applications.
Initial Samples and Spread Areas
Similar past malware versions have spread globally. Security researchers anticipate the same for Octo2, with initial detected samples found in Italy, Poland, Moldova, and Hungary.
Threat Fabric stated:
“The emergence of this Octo2 virus represents a significant evolution of mobile malware, particularly in the context of bank security. Its ability to conduct on-device fraud invisibly and seize sensitive data, combined with its ease of customization by various threat actors, increases risks for mobile banking users worldwide.”
Cybersecurity experts recommend that users ensure the applications they install on their phones come from reliable sources and to avoid fake applications. Additionally, keeping antivirus software updated is emphasized as a crucial precaution.
Due to the malware’s ability to conceal its actions, users should regularly check their bank accounts and report any suspicious transactions to their banks immediately.
Octo2 malware poses a serious threat to mobile banking users. Users’ vigilance and security measures can help prevent such attacks. Moreover, security firms continue to work on detecting and preventing such malware.