Even if your mobile device has not been attacked yet by malicious hackers, it might be high time to take notice. From varying types of spyware to Trojans that can bypass even two-factor authentication. But as the mobile and other technology are developing, so are the malicious hackers adopting and developing their methods to attack any of your electronic devices, where mobile phones and tablets seem to be the ones they are currently concentrating on.
It is not just disabling your device anymore, but stealing your information, applications, and particularly your money, by illegally using your mobile banking apps.
'Svpeng' Trojan can rob you blind
"Svpeng" Trojan first cropped up in 2013, and its primary goal then was phishing. In 2014 it transformed itself in ransomware that would lock the device and demand a $500 ransom. It then started directly attacked SMS banking with the use of phishing web pages. This method would attempt not only to steal your credentials but also block devices to demand money.
Then in 2016, "Svpeng" creators started distributing this malware by posing as " Google AdSense," using a vulnerability in the "Chrome" browser. But now it seems they have gone a step further. As discovered by cyber security companies like "Kaspersky" and "Securelist," since mid-July of 2017, they can misuse the keylogger feature of the Accessibility Services in the Android mobile devices.
Accessibility Services are helpful for people with disabilities or every other user when they are temporarily not able to fully use the device, like when you are driving. Through those services "Svpeng" simply grabs Administrator Rights, overlays its functions over legitimate apps, and then starts misusing the device. It can set itself as a default SMS app, grant itself all sorts of permissions like reading contacts, making calls and send and receive SMS messages.
What is even more disturbing, this Trojan can block your every attempt to remove device administrator rights that "Svpeng" has taken over. It then can steal any text entered into any other app and even take screenshots, something banking apps were set to block until now! Basically, in a few steps, hackers can empty your bank account!
While the source of "Svpeng" is unknown, it is intriguing that it can work with any language except Russian. So far it is known that "Svpeng" has spread over 23 countries, with most attacked user so far being located in Russia (29%) and Germany (27%). With the effectiveness "Svpeng" has exhibited so far, it would be no wonder if it spreads even further.
How to take preventive measures
As the experts like Roman Uncheck from the Kaspersky Labs point out, it can be tough to protect yourself from such an invasive malware, since "Svpeng" will work even on fully-adopted Android devices with the latest Android version and all the necessary security updates installed. Still, as some experts point out, there are standard measures that can help in preventing your device to be affected.
First is to stick to trusted sources and verified developers that can be found on Google Play Store and Apple App Store. Second is to verify permissions before you install any app on your device. Third, is to avoid downloading apps from third party sources and avoid unsecured Wi-Fi hotspots. Then, it is critical not to click on any links you receive in an SMS, MMS or e-mail coming from an unverified source. Finally, you should always have an antivirus app installed, and you should update it regularly.