Pages

Law Enforcement Agencies Render The Fastest Spreading ‘FluBot’ Malware Inactive

A major operation was recently conducted in more than 11 countries around the globe which ultimately brought back fruitful results and killed a leading malware strain.

The FluBot had been designated as an alarming situation after recent reports showed how it managed to steal so many users’ online banking details with so much ease.

But thankfully, law enforcement agencies have finally reached the bottom of the mystery, inactivating it and thereby killing it once and for all.

The news was recently announced via the latest report by Europol which mentioned that authorities had been on the rise to actively capture the malware strain after it started making its widespread presence in different places.

Be it text messages, users’ sensitive details, passwords, banking information, and more- there was a lot at risk and it was going down fast as more and more smartphones started to get infected internationally.

With great help from the Dutch Police, we saw the malware get disrupted and the infrastructure that had been supporting the malware was also razed down this month. And that is ultimately what caused it to become inactive in the end.

The first report about FluBot came towards the end of the year 2020. This is the exact date when the malware began to infect so many devices around the world. And believe it or not, all it took was one innocent-looking text message to trick users into getting their phones infected.

The innocent-looking messages simply asked the user to go about clicking on the link and that would ultimately result in the malware being installed. Once done, you could track a specific delivery package or end up hearing fake voicemails.

And after that was done and over with, we saw the malware take things one step further by requesting permissions for accessibility.

And before you know it, hackers would gain the new information and ease of access to take over banking details and other related information that many deem to be sensitive like your cryptocurrency details too.

The malware also had the ability to disable any of a device’s security systems in place. And after entering into the phone’s system, it would multiply and spread at the speed of light.

Soon, texts would be sent out with authentic links to the malware which would forward it to your contact list or people in the address book.

For now, we know that the investigation is still taking place to help reveal who the actual culprits are behind this worldwide campaign.


Read next: Will a Password Free System Give Big Tech Too Much Power?

No comments: