If this sounds too techy for you, you can also do a factory reset on your phone, which erases the malware. Activate safe mode, then head to settings and applications. Then just find the right app and remove it. Here are the commands to remove the malware from system apps: T he phone needs to be in developer mode with ADB enabled. If FluBot has already infected your Android device, and it has been granted accessibility right, there’s two ways you can remove it.įirst you can use Android Debug Bridge (ADB ) to stop the malware from being a system app, after which you can uninstall it. If granted, the malware grants itself more extensive app permissions and becomes a system app. Once downloaded, t he “tracking app” that actually is FluBot, asks for accessibility permissions. Following the provided link, the victim d ownload s the mal ware that is masked using the delivery company’s name and logo. The message tells there’s a package in delivery and prompts the receiver to install a tracking a pp to settle the delivery time. The message claims it has been sent by some well-known delivery service, like DHL, UPS, FedEx, Correos, or Amazon. Here’s how FluBot worksĪn infected device sends an SMS message that contains a phishing link. It’s likely to spread also to the rest of the world if the threat actors behind it aren’t stopped. All of this is done without the users’ knowledge.įluBot has so far been detected mostly in European countries. FluBot also sends SMS messages to new victims and spreads itself further. The information is used to make payments (or in other words: steal your money), account takeover and online identity theft. FluBot steals passwords and login information to your online accounts, personal details, and banking information. A new Android malware called Flubot is spreading in Europe.
0 Comments
Leave a Reply. |