{"id":1276,"date":"2016-02-08T19:08:35","date_gmt":"2016-02-08T16:08:35","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=1276"},"modified":"2019-06-11T11:56:06","modified_gmt":"2019-06-11T08:56:06","slug":"mobile-virus-android-bankosy-intercepts-otp-passwords","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/mobile-virus-android-bankosy-intercepts-otp-passwords\/","title":{"rendered":"Mobile Trojan Virus Android.Bankosy Intercepts One-Time Passwords"},"content":{"rendered":"<p>We store a lot of important information in the network: personal correspondence, photos, documents. For the most part, these are spiritual values &#8211; precious memories and the fruits of hours-long labor. But the Internet also stores rather concrete financial \u2018matters\u2019: our money.<\/p>\n<p>Today many people use online banking, as it is convenient to transfer funds, to pay for the services, and to control your accounts online. It is no wonder that the fraudsters of all sorts pay special attention to the bank online resources and tirelessly attack them, constantly coming up with something new.<\/p>\n<p>Not so long ago, a new version of the mobile trojan called <em>Android.Bankosy<\/em> was discovered.<\/p>\n<h2>What is dangerous in the trojan virus Android.Banksy<\/h2>\n<p>This virus intercepts one-time passwords used in banking applications for two-factor authentication (<em>2FA<\/em>).<\/p>\n<p>A temporary OTP passwords used for the two-step authentication of the user are often sent via the text messages. Earlier, different versions of the banking trojan viruses, with <em>Android.Bankosy<\/em> being among them, have learned to intercept the authentication code sent this way.<\/p>\n<p>In response to this threat, the cyber security specialists have developed and introduced systems that send one-time passwords via voice calls from the bank.<\/p>\n<p>It seems that a reliable data protection was ensured. But as it has turned out even an advanced one-time passwords delivery means are not a barrier for hackers. The creators of the mobile trojan virus <em>Android.Bankosy<\/em> taught it to overcome this new type of protection. The current version of this virus is capable of intercepting calls from the bank server. Moreover, <em>Android.Bankosy<\/em> can turn off the sound on your phone, and lock the device\u2019s screen if there is a call from the bank number. Thus, the client even won\u2019t find out he received a code, and the fraudsters will carry out further actions on the account on behalf of the client.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4791 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2016\/02\/android-bankosy-1.jpg\" alt=\"Mobile Trojan Virus Android.Bankosy\" width=\"1200\" height=\"633\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2016\/02\/android-bankosy-1.jpg 1200w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2016\/02\/android-bankosy-1-300x158.jpg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2016\/02\/android-bankosy-1-768x405.jpg 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2016\/02\/android-bankosy-1-1024x540.jpg 1024w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2016\/02\/android-bankosy-1-610x322.jpg 610w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<h2>How to protect data from the banking trojan Android.Bankosy<\/h2>\n<p>What can a regular user of online banking oppose to the hackers armed with the most modern tools? As is known, the best tools are usually the simplest. But sometimes we either forget or are too lazy to use them. Perhaps, considering them not effective enough. But they work. And work quite reliably.<\/p>\n<ol start=\"1\">\n<li><strong>Keep your smartphone secure from viruses.<\/strong><\/li>\n<\/ol>\n<p>To get the control over the victim\u2019s phone, the trojan virus should, first of all, penetrate in it. This can be done in a standard for all viruses way: as part of a harmless and even useful application. The official stores carefully control their software. The applications they offer are rarely infected with viruses. Thus, we must resist the temptation, and do not download programs from the doubtful websites. This is especially true for the charged software. Do not forget about free cheese in a mousetrap. If you install the virus like the <em>Android.Bankosy<\/em> on your gadget, you can lose a lot more money than you need to buy the app you liked.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4787 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2016\/02\/how-to-protect-yourself-from-android-bankosy-1.jpg\" alt=\"Protection from Android.Bankosy\" width=\"838\" height=\"442\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2016\/02\/how-to-protect-yourself-from-android-bankosy-1.jpg 838w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2016\/02\/how-to-protect-yourself-from-android-bankosy-1-300x158.jpg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2016\/02\/how-to-protect-yourself-from-android-bankosy-1-768x405.jpg 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2016\/02\/how-to-protect-yourself-from-android-bankosy-1-610x322.jpg 610w\" sizes=\"auto, (max-width: 838px) 100vw, 838px\" \/><\/p>\n<ol start=\"2\">\n<li><strong>Use strong authentication.<\/strong><\/li>\n<\/ol>\n<p>The example of the virus <em>Android.Bankosy<\/em> proves that even 2-factor authentication cannot always protect you from the intruders. Indeed, the familiar methods of obtaining OTP passwords via text messages (and even voice calls) are not completely reliable.<\/p>\n<p>That happens because modern hackers are able to get into the mobile phone network and transfer the call in the desired direction. Telephone communication channels are usually open and the information is transferred via them in an unencrypted form.<\/p>\n<p>Another thing is the <a href=\"https:\/\/www.protectimus.com\/blog\/hardware-or-software-token-which-one-to-choose\/\">OTP token<\/a>. Of course, a hardware one-time password generator is not free. But it provides a serious level of protection. It works autonomously from the Internet and telephone networks. And thus, fraudsters won\u2019t manage to infect your device with the virus.<\/p>\n<p>An alternative to a paid hardware token is an application for smartphone &#8211; a software OTP token. For example, <a href=\"https:\/\/www.protectimus.com\/protectimus-smart\">Protectimus SMART<\/a> by <a href=\"https:\/\/www.protectimus.com\/\">Protectimus<\/a> is absolutely free, but at the same time, able to provide a high-level of security during the two-way authentication. The <a href=\"https:\/\/www.protectimus.com\/blog\/detailed-information-on-data-signing\/\">data signature function<\/a> contributes to its reliability greatly. One-time passwords are generated on the basis of the key parameters of a particular transfer such as the sum of transferred money, the IP-address of the sender, the time of operation or a current account balance.<\/p>\n<p>Although the application is installed on the smartphone, which may already be infected with viruses, a CWYS function (data signature) will make the intercepted password useless for fraudsters as the data of their fake transaction, of course, will be quite different from that real used when creating the password.<\/p>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>We store a lot of important information in the network: personal correspondence, photos, documents. For the most part, these are spiritual values &#8211; precious memories and the fruits of hours-long labor. But the Internet also stores rather concrete financial \u2018matters\u2019: our money. Today many people use online banking, as it is convenient to transfer funds, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4455,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[7],"tags":[16,166,120,10,139,99],"class_list":["post-1276","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry-news","tag-2fa","tag-hacking-attacks","tag-multifactor-authentication","tag-otp","tag-tokens","tag-two-factor-authentication"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/1276","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=1276"}],"version-history":[{"count":9,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/1276\/revisions"}],"predecessor-version":[{"id":4792,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/1276\/revisions\/4792"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/4455"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=1276"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=1276"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=1276"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}