A selfie with your identity card? Android banking virus Acecard levels up

by Julie Splinters - -

While spying on newest malware prevention technologies, cyber crooks create new more persuasive deception forms. Newly emerged banking trojan, which mainly plagues Android devices, pretends to be a legitimate payment application and tries wheedle out confidential information by asking users to make selfies with their ID cards. After several credit card companies had implemented the new verification technique by demanding a photo with your credit or ID card, the hackers took this novelty as the inspiration for new phishing techniques.

After various forms of cyber threats, especially file-encrypting malware, have been thriving, the security, as well as online payment companies, took necessary measures to secure their clients‘ payments. However, soon enough, the cyber criminals have come up with an Android banking trojan called Acecard. Usually, it disguises under an infected torrent link, a video codec or abandoned and outdated software which users accidentally install along with freeware. When the virus gets activated, it starts its misdeed. It overlays all your payment applications on the device with its fake software. Attentive users might notice that the trojanized apps usually contain altered design details. After finishing the first stage of the hijack, the trojan is capable of recording crucial information, including your bank account passwords, credit card number and 4-digit verification codes. Needless to say, how much disastrous outcomes of such data theft can be. In short, the trojans gets access to a wide range of personal accounts. It does not only reach out for your money, but it may sell the collected passwords to cyber criminals for a delicate amount of money as well.

Acecard virus advances

Acecard has been regarded one of the most advanced and damaging banking trojans as it is capable of applying its “layer” to multiple application of different banks. In fact, due to such rapid advancement, it can hijack any program and replace it with its malignant alternative. One of many factors facilitating the infiltration is poor cyber protection. Still, a significant number of users, who shifted from using standalone computers to mobile devices, forget to install proper a security application. You can choose from a wide range of anti-spyware mobile versions. In addition, users should restrain from making any reckless actions and pay attention while installing any application. Give it a second thought if a program asks for you credit or ID card details, left alone selfies with them.

About the author

Julie Splinters - Malware removal specialist

Julie Splinters is the News Editor of 2-spyware. Her bachelor was English Philology.

Contact Julie Splinters
About the company Esolutions


Files
Software
Compare
Like us on Facebook