- The spam SMS messages are used to redirect targets to malicious set up pages. These pages are alleged to be pending/lacking parcel deliveries or stolen photographs uploaded on-line.
- After the profitable an infection, FluBot operators use the malware to steal cost info, textual content messages, contacts, and banking credentials from compromised units.
How does the marketing campaign work?
- Malicious texts are being despatched to cellphone customers that include a hyperlink to a lure web page that makes an attempt to create a way of urgency. The lure web page urges victims to obtain a monitoring software to get the main points about their parcel.
- In one other variation of the marketing campaign, customers are redirected to a web page displaying a message that the customers’ system is contaminated with the FluBot malware. Subsequently, it urges victims to obtain the anti-FluBot app.
- In case of an alert from units towards third-party app set up, the potential victims are urged to allow the set up of such apps.
Current information snippets
- In March, the Catalan police arrested 4 suspects believed to be spreading FluBot.
- A few months ago, a Swiss safety agency (PRODAFT) claimed that the botnet was controlling round 60,000 units that collected the cellphone numbers belonging to 25% of residents of Spain.
FluBot remains to be lively and arising with new methods of focusing on Android customers to steal info. Now, it’s utilizing spam SMS messages to idiot customers into putting in malware-laden apps. Thus, customers ought to at all times be cautious of suspicious textual content messages and use the official app retailer.