Your wallet may be emptied! Beware of this password-stealing virus on Android

cyber security researchers Android issued a new warning to its users. chameleon It was stated that a malware called is targeting banking applications. According to the report, it has the ability to control the device thanks to two critical features.

What is Chameleon virus for Android?

Chameleon, the malware that steals users’ financial information, is now much more powerful, according to security researchers at ThreatFabric. It was stated that it gained two important new features that significantly increase the risks for Android users.

Good news for Android users!  Hiding apps is now possible

The first worrying feature is that the malware has mastered device takeover fraud. The virus asks Android devices to enable accessibility services permission. When this permission is given, the malware provides uncontrolled access without the knowledge of the device owner.

Cheaper than water: Moto G34 with 120Hz screen introduced!Cheaper than water: Moto G34 with 120Hz screen introduced!

Cheaper than water: Moto G34 with 120Hz screen introduced!

Moto G34 5G with 120Hz display was released. Here are the details of Moto G34, which comes with a 50 Megapixel main camera.

Even more worrying is that Chameleon can disable fingerprint or face unlock. Malware that changes the authentication mechanism replaces the phone password with a PIN code. With this password, he can unlock the device as he wishes.

Cybersecurity experts stated that new techniques make Chameleon much more dangerous and difficult to detect. It warned that it could access banking, payment and other financial information.

It was reported that the malware is currently targeting users in Europe. It was stated that it was spread through various forums, WhatsApp and Telegram groups. That’s why we recommend that you do not download applications from outside official stores such as Google Play Store.

So what do you think about this issue? You can share your opinions with us in the Comments section below.

source site-28