¡Protege lo creado!

Otros recursos

  • free.drweb-av.es — utilidades gratuitas, complementos, informadores
  • av-desk.com — un servicio en Internet para los proveedores de servicios Dr.Web AV-Desk
  • curenet.drweb.com — utilidad de desinfección de red Dr.Web CureNet!
Cerrar

Mi biblioteca
Mi biblioteca

+ Añadir a la biblioteca

Soporte
Soporte 24 horas | Normas de contactar

Sus solicitudes

Perfil

Android.BankBot.29.origin

Added to the Dr.Web virus database: 2015-03-18

Virus description added:

A banking Trojan that steals authentication information used by the clients of some South Korean financial organizations. It is distributed under the guise of a Google Play application.

screen

Once launched, Android.BankBot.29.origin attempts to acquire administrator privileges, while hiding the appropriate system prompt behind its own dialog box that asks the victim to install an allegedly new version of the program. By giving consent, the user allows the Trojan to acquire administrator privileges without knowing it.

screen

Android.BankBot.29.origin steals authentication information from the following online banking applications used by South Korean financial organizations:

  • nh.smart,
  • com.shinhan.sbanking,
  • com.epost.psf.sdsi,
  • com.wooribank.pib.smart,
  • com.hanabank.ebk.channel.android.hananbank,
  • com.kbstar.kbbank,
  • com.kftc.dgbsmb,
  • com.keb.android.mbank,
  • com.smg.spbs,
  • com.cu.sb,
  • com.kftc.citismb,
  • com.ibk.neobanking,
  • com.areo.bs,
  • com.knb.psb,
  • com.kftc.jbsmb,
  • com.kftc.jejusmb,
  • com.kftc.kjbsmb.

Once one of these programs is launched, the malware replaces its interface with a fake one that prompts the user to enter all the confidential information necessary to control their bank account. The divulged data is forwarded to cybercriminals.

Under the pretext of subscribing the user to a banking service, Android.BankBot.29.origin attempts to install the malicious program Android.Banker.32.origin that is stored in the Trojan’s body.

Curing recommendations


Android

  1. If the mobile device is operating normally, download and install Dr.Web for Android Light. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web для Android Light onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android

Desarrollador ruso de antivirus Dr.Web
Experiencia de desarrollo a partir del año 1992
Dr.Web se usa en más de 200 países del mundo
Entrega de antivirus como servicio a partir del año 2007
Soporte 24 horas

Dr.Web © Doctor Web
2003 — 2021

Doctor Web es un productor ruso de los medios antivirus de protección de la información bajo la marca Dr.Web. Los productos Dr.Web se desarrollan a partir del año 1992.

125124, Rusia, Moscú, c/3 Yamskogo Polya, 2, edif.12А