The page may not load correctly.
分析不法分子使用的技术可以使我们预测其可能的发展方向,以便更加有效地抵御今后可能遇到的威胁。您也可以了解一下恶意程序如何在被感染的系统中运行以及如何抵御这些程序。
A banking Trojan family for Android mobile devices intended to steal logins and passwords to access online banking services using fake authorization forms. The Trojans of this family also covertly steal money from users’ bank accounts. The Android.ZBot malware can be downloaded under the guise of a benign program once a user visits fraudulent or hacked websites, or another malicious application can download it to a device.
The Trojans can execute the following actions:
The server sends instructions to the Android.ZBot Trojans that specify the applications on top of which a phishing message is to be shown. Then they periodically begin to check whether the corresponding applications are running. Once one of such applications is launched, the banking Trojans create a special input form, the content of which is downloaded from the server, and display it on top of the application. Such fake dialogs often imitate authorization forms of online banking applications. Logins and passwords that were entered by a user are sent to the command and control server. If the victim tries to close the bogus dialog, the Android.ZBot Trojans redirect the user to the home screen creating an illusion that this prompt really belongs to the corresponding legitimate application.
Android.ZBot.1.origin
Android.ZBot.127
Android.ZBot.129
Android.ZBot.130
Android.ZBot.132
Android.ZBot.133
Android.ZBot.137
Android.ZBot.2.origin
Android.ZBot.3.origin
据统计,每五个安卓程序中就有一个存在漏洞(换句话说就是带有缺陷),这种漏洞可使不法分子将移动木马成功嵌入设备并执行所需操作。
Dr.Web for Android中的安全审计 对移动设备的安全性做出诊断和分析,发现问题和漏洞是会提示解决方案。