{"id":13243,"date":"2016-10-14T09:00:49","date_gmt":"2016-10-14T13:00:49","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=13243"},"modified":"2019-11-15T06:52:32","modified_gmt":"2019-11-15T11:52:32","slug":"mobile-banking-trojans-faq","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/mobile-banking-trojans-faq\/13243\/","title":{"rendered":"Mobile banking Trojans, explained"},"content":{"rendered":"<h3>1. Why do I need to read this?<\/h3>\n<p>This article will help you to protect the money in your bank account.<\/p>\n<h3>2. Mobile banking Trojans \u2014 what are they?<\/h3>\n<p>Every smartphone is a compact computer equipped with its own operating system and software, and so, just like PCs, smartphones are targeted by malware. Mobile banking Trojans are one of the most dangerous species in the malware world: They steal money from mobile users\u2019 bank accounts.<\/p>\n<h3>3. Who is at risk?<\/h3>\n<p>People who own gadgets and use banking apps or buy something using application stores or in-app purchases. Android users run the highest risk of being attacked by mobile banking Trojans: 98% of them are designed for this ubiquitous OS.<\/p>\n<p>Throughout 2016 mobile banking Trojans <a href=\"https:\/\/securelist.com\/analysis\/quarterly-malware-reports\/75640\/it-threat-evolution-in-q2-2016-statistics\/\" target=\"_blank\" rel=\"noopener noreferrer\">actively attacked<\/a> users from Russia, Germany, and Australia. Other countries in the top 10 are South Korea, Uzbekistan, China, Ukraine, Denmark, Kyrgyzstan, and Turkey.<\/p>\n<h3>4. Are they really that dangerous?<\/h3>\n<p>This type of Trojans is one of the most significant threats of the decade. In 2016 alone, we detected more than 77,000 samples of mobile banking installers. This threat shows no sign of fading away any time soon.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Banking Trojans: mobile\u2019s major cyberthreat <a href=\"https:\/\/twitter.com\/hashtag\/malware?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#malware<\/a> <a href=\"https:\/\/t.co\/qWtgJjbCjq\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/qWtgJjbCjq<\/a> <a href=\"http:\/\/t.co\/qpyQEJvYHG\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/qpyQEJvYHG<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/649215975485665280?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">September 30, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>5. How do mobile Trojans infiltrate smartphones and tablets?<\/h3>\n<p>It\u2019s hard to believe, but users download mobile banking Trojans themselves. In most cases cybercrooks disguise Trojans as legitimate apps and lure people into installing the malware.<\/p>\n<p>Cybercriminals tend to publish malicious apps on third-party app stores, <a href=\"https:\/\/www.kaspersky.com\/blog\/asacub-trojan\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">send phishing text messages containing malicious URLs<\/a>, and sometimes go as far as <a href=\"https:\/\/www.kaspersky.com\/blog\/acecard-android-trojan\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">sneaking into the official Google Play store<\/a>.<\/p>\n<h3>6. Are you kidding? Even Google Play isn\u2019t safe?<\/h3>\n<p>Unfortunately, it isn\u2019t entirely safe. Although the Play Store employs a series of protections, it cannot repel 100% of all threats. Android users are frequently tricked into downloading malicious apps posing as legitimate ones. Such malicious apps include mobile banking Trojans \u2014 for example, the notorious <a href=\"https:\/\/www.kaspersky.com\/blog\/acecard-android-trojan\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Acecard<\/a>.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">The continual evolution of <a href=\"https:\/\/twitter.com\/hashtag\/mobile?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#mobile<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/malware?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#malware<\/a> \u2013 <a href=\"https:\/\/t.co\/lev9ovlF4j\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/lev9ovlF4j<\/a> <a href=\"https:\/\/t.co\/lZMRPKVblr\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/lZMRPKVblr<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/705062161639469057?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">March 2, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>7. I have an iPhone, so I don\u2019t have to worry, right?<\/h3>\n<p>Yes and no. To date, we have not heard of any case of an iPhone being infected with a banking Trojan, but malicious apps have managed to infiltrate the App Store on various occasions. For example, some six months ago, the <a href=\"https:\/\/www.kaspersky.com\/blog\/xcodeghost-compromises-apps-in-app-store\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">XcodeGhost Trojan<\/a> infected more than 40 legitimate iOS apps, including the very popular Chinese messaging app <a href=\"https:\/\/en.wikipedia.org\/wiki\/WeChat\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">WeChat<\/a>.<\/p>\n<p>iPhone owners should keep their eyes open. Apple doesn\u2019t allow antivirus apps in iOS, so once there is a working Trojan for iOS, users will face the threat on their own.<\/p>\n<p>However, if your iPhone is jailbroken, you are at much heavier risk. Jailbreaking means basically destroying all the protection that Apple has built for its operating system, so it\u2019s much easier for cybercriminals to infect a jailbroken device.<\/p>\n<h3>8. How exactly do they steal the money?<\/h3>\n<p>Usually it works like that. Once the banking app is launched, the Trojan displays its own interface overlaying the banking app\u2019s interface. As a user inputs credentials, the malware steals the information.<\/p>\n<div class=\"pullquote\">Be especially careful with apps that request permission for access to SMS<\/div>\n<p>To fool the user, a mobile banking Trojan must be able to impersonate a banking app convincingly. The most effective Trojans can impersonate dozens of banking apps, payment services, and even instant messaging apps.<\/p>\n<p>There is one critical stage in the process of stealing money \u2014 hijacking SMS with one-time passwords sent by the bank\u2019s system as part of two-factor authentication. That\u2019s why mobile banking malware needs permission to access SMS, and that\u2019s why you need to be extremely cautious with all apps that request such permission.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">In simple words: how Trojans fool 2-factor authentication &amp; steal money from mobile banks <a href=\"https:\/\/t.co\/kfqKtUq3tY\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/kfqKtUq3tY<\/a> <a href=\"https:\/\/t.co\/7S2b5BCS0v\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/7S2b5BCS0v<\/a><\/p>\n<p>\u2014 Eugene Kaspersky (@e_kaspersky) <a href=\"https:\/\/twitter.com\/e_kaspersky\/status\/709305837898969088?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">March 14, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Mobile Trojans can steal money either in small portions over months or at once.<\/p>\n<h3>9. How can I tell if my smartphone is infected?<\/h3>\n<p>The most obvious sign is losing money. Comb through your bank transactions regularly. If you see no suspicious transactions but would like to check your phone anyway, use the free <a href=\"https:\/\/app.appsflyer.com\/com.kms.free?pid=smm&amp;c=ww_kdaily\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Kaspersky Antivirus &amp; Security for Android<\/a> to scan your device.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Protecting your #money: everything you need to know about #mobile #bankers, plain and simple<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FqW26&amp;text=Protecting+your+%23money%3A+everything+you+need+to+know+about+%23mobile+%23bankers%2C+plain+and+simple\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<h3>10. Which Trojans are the most dangerous?<\/h3>\n<p>OpFake is a very industrious Trojan that mimics the interfaces of almost 100 banking and finance apps. The <a href=\"https:\/\/www.kaspersky.com\/blog\/acecard-android-trojan\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Acecard family<\/a> is also very strong: able to impersonate more than 30 banking apps or overlay any app\u2019s interface on command. In 2016, the <a href=\"https:\/\/www.kaspersky.com\/blog\/asacub-trojan\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Asacub<\/a>, <a href=\"https:\/\/threatpost.com\/?s=svpeng\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Svpeng<\/a>, and Faketoken Trojans swarmed Russia.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Evolution of <a href=\"https:\/\/twitter.com\/hashtag\/Asacub?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Asacub<\/a> trojan: from small fish to ultimate weapon \u2013 <a href=\"https:\/\/t.co\/lLv0pY4lol\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/lLv0pY4lol<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/infosec?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#infosec<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/mobile?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#mobile<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/banking?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#banking<\/a> <a href=\"https:\/\/t.co\/gAM3zzy7aC\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/gAM3zzy7aC<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/689836995196129281?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">January 20, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>11. How can I protect myself?<\/h3>\n<ul>\n<li>Enable SMS notifications for your mobile bank. Not all banking Trojans hijack SMS, and, in general, it\u2019s a very effective way to monitor your account.<\/li>\n<li>Download apps only from official stores: Google Play Store for Android, Apple App Store for iOS, and so forth.<\/li>\n<li>Look carefully at the rights each app requests. Those that request permission for access to SMS require further scrutiny.<\/li>\n<li>Install an antivirus solution \u2014 like <a href=\"https:\/\/app.appsflyer.com\/com.kms.free?pid=smm&amp;c=ww_kdaily\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Kaspersky Antivirus &amp; Security for Android<\/a>.<\/li>\n<\/ul>\n<h3>12. My money was stolen! What should I do?<\/h3>\n<p>Immediately <b>contact<\/b> your bank to freeze your card(s) and dispute the transaction in question. In some cases, banks don\u2019t send transfers right away, so <a href=\"https:\/\/www.kaspersky.com\/blog\/5-lessons-i-learned-from-my-credit-card-hack\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">there is a chance your money isn\u2019t actually gone yet<\/a>.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">5 lessons I learned from having my credit card hacked <a href=\"https:\/\/t.co\/HVSJGCHlFG\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/HVSJGCHlFG<\/a>  <a href=\"https:\/\/twitter.com\/hashtag\/onlinepayment?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#onlinepayment<\/a> <a href=\"http:\/\/t.co\/qsytYC83wv\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/qsytYC83wv<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/532559791340937216?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">November 12, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Make sure you <b>remove<\/b> the malicious app from your device, and check your smartphone with <a href=\"https:\/\/app.appsflyer.com\/com.kms.free?pid=smm&amp;c=ww_kdaily\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">antivirus<\/a> software.<\/p>\n<p>Finally, we suggest rereading the previous answer to <b>avoid<\/b> this situation in the future.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Everything you need to know about mobile banking Trojans and how to fight them.<\/p>\n","protected":false},"author":522,"featured_media":13244,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2683,9],"tags":[1444,1380,734,1161,423,97,422],"class_list":{"0":"post-13243","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"category-tips","10":"tag-acecard","11":"tag-asacub","12":"tag-banking-trojans","13":"tag-finance","14":"tag-mobile-devices","15":"tag-security-2","16":"tag-threats"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/mobile-banking-trojans-faq\/13243\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/mobile-banking-trojans-faq\/7796\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/mobile-banking-trojans-faq\/7809\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/mobile-banking-trojans-faq\/7835\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/mobile-banking-trojans-faq\/9309\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/mobile-banking-trojans-faq\/9154\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/mobile-banking-trojans-faq\/13135\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/mobile-banking-trojans-faq\/2548\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/mobile-banking-trojans-faq\/6172\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/mobile-banking-trojans-faq\/6767\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/mobile-banking-trojans-faq\/5535\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/mobile-banking-trojans-faq\/8960\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/mobile-banking-trojans-faq\/12894\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/mobile-banking-trojans-faq\/13135\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/mobile-banking-trojans-faq\/13243\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/mobile-banking-trojans-faq\/13243\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/banking-trojans\/","name":"banking trojans"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/522"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=13243"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13243\/revisions"}],"predecessor-version":[{"id":30122,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13243\/revisions\/30122"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/13244"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=13243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=13243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=13243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}