Security News Gugi/Fanta/Lime Malware Takes Over Androids

frogboy

In memoriam 1961-2018
Thread author
Verified
Top Poster
Well-known
Jun 9, 2013
6,720
A new family of financial malware, dubbed Gugi/Fanta/Lime, has emerged on the scene. It can bypass the standard security protocols of an Android operating system (version 6).

The malware seeks system privileges and user credentials, and once it gains them, it acquires complete control of the Android device.

Comodo Threat Research Labs (CTRL) detected the malware to be active in Russia, but said that it expects it to spread worldwide.

Cyber-criminals employ social engineering and phishing to initiate the infection. They send out spam messages that contain a hyperlink. If the user is not wary enough and clicks on it, he or she is taken to a malicious website and is asked to click on another link. Clicking then initiates download of Trojan-Banker.AndroidOS.Gugi.c onto the user’s device.

From there, it seeks seemingly authentic permission requests, which are in actuality permissions for app overlay, device administrator rights; send, view and receive SMS and MMS; make calls, read and write contacts; and more. It also requests permission for BuildConfig, HindeKeybroad and ContextThemeWrapper, and acquires phone details.

The malware actually “forces” the user to grant all the needed permissions, CTRL explained, in a blog. If the user denies permission at any time, then the Gugi/Fanta/Lime Trojan will completely block the infected device. To regain access to the device, the user has no other option other than to reboot in safe mode and then try to remove/uninstall the Trojan using security solutions.

Read More. Gugi/Fanta/Lime Malware Takes Over Androids
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top