The infamous Ginp banking Trojan, which acquired the ability to insert fake text messages into the inbox of a regular SMS application in March, has now acquired a new functionality that takes advantage of the recent pandemic.
Once installed on the victim's phone, Ginp Trojan may be instructed by an attacker to open a website called "Coronavirus Finder", which claims that there are people nearby infected with the virus. To find out where these people are, the victim is asked to pay 75 euros.
If the victim agrees, it is transferred to a payment website.
Once the payment details are recorded, however, the victim is not charged either this amount or receives information about these "infected" individuals. Instead, his credit card details have just been handed over to digital criminals.
Ginp is one Trojan which has evolved rapidly since it first appeared, constantly acquiring new features. In addition, while in the past the targets were mainly residents of Spain, the name of this latest version suggests that the attackers plan to target other countries as well.
"Cybercriminals have been trying for months to take advantage of the coronavirus crisis by launching attacks. Phishing and creating malware with a core theme of the coronavirus. This is the first time, however, that we see a bank Trojan to try to take advantage of the pandemic. This is worrying, especially since Ginp is so effective Trojan. We encourage Android device users to be especially vigilant at this time and for pop-ups, unknown web pages and unexpected messages. coronavirus "They should always be treated with skepticism," said Alexander Eremin, a security expert at Kaspersky.
More information about Ginp you can read in Kaspersky Daily.
To reduce your risk of exposure to Ginp or other banking Trojans, Kaspersky experts recommend:
- "Download" applications only from the official Android Stores.
- Do not click on suspicious links or disclose sensitive information, such as passwords or credit / debit card information.
- Install a reliable security solution on your phone.