Track Common Adversary Tasks Performed Using Anubis
To know more about it, you can go through my detailed document by clicking here
Overview
How Does It Works?
After successfully launching itself, the trojan immediately connects with the command and control server and automatically downloads an application to start a proxy. After that, a fraudulent message appears on the screen to disable the Google Play Protect which gives the attacker full control. After completing these steps, the threat actors can extract whatever information they want and corrupt the network environment. It is believed that their main targets are the U.S. banks like Bank of America, U.S. Bank, Capital One, Chase, SunTrust, Wells Fargo, etc.
Prevention:
- Don't open any kind of suspicious or irrelevant emails.
- As these malwares are often introduced via bogus forums, you should always use official and verified channels for downloading.
- Don't use illegal activation tools and third party updates.
- Always install a reputable anti-virus/anti-spyware and keep it updated.
- Scan your device with a legitimate anti-malware software in order to remove any malware infections.
To know more about it, you can go through my detailed document by clicking here
Comments
Post a Comment