{"id":1450,"date":"2016-03-29T15:19:46","date_gmt":"2016-03-29T12:19:46","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=1450"},"modified":"2019-06-06T18:07:16","modified_gmt":"2019-06-06T15:07:16","slug":"mobile-banking-trojan-acecard","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/mobile-banking-trojan-acecard\/","title":{"rendered":"Mobile Banking Trojan Acecard \u2013 All You Need to Know About a New Threat"},"content":{"rendered":"<p>The smartphone has a wide range of functions. Despite its main feature of being a phone, this gadget allows you to listen to the music, read, surf the Internet, pay bills, work with documents, etc. A huge part of personal and business life of our contemporaries is tied to this smart device. Realizing this, the hackers began to concentrate their efforts on creating mobile malware programs. Many of them have already been discovered: <em><a href=\"https:\/\/www.protectimus.com\/blog\/mobile-virus-android-bankosy-intercepts-otp-passwords\/\">Android.Bankosy<\/a><\/em>,&nbsp;<em>Asacub<\/em>,&nbsp;<em>Facetoken<\/em>&#8230; Yet, we haven&#8217;t seen such a powerful and multi-functional mobile banking Trojan as the <em>Acecard<\/em>.<\/p>\n<p>Though, <em>Acecard<\/em>&nbsp;didn&#8217;t become so strong in a moment. The first &#8220;harmless&#8221; version of this virus appeared in early 2014. At that time, it did not perform any harmful actions. It just infected the smartphones \u2013 absolutely inconspicuously for the users. It took one and a half years for the <em>Acecard<\/em> to turn into a full-fledged threat. After growing in strength in May 2015, Trojan took to serious attacks. Today, it has about 10 types, each of which is strong and dangerous. <em>Acecard<\/em> actions are not localized in one country. It has already been spotted in Germany, France, Australia, Russia, and Austria.<\/p>\n<blockquote><p><strong><em>Mobile banking Trojan Acecard can imitate over 50 applications of banks and payment systems, chat rooms (including Viber, WhatsApp, Skype), PayPal and Gmail.<\/em><\/strong><\/p><\/blockquote>\n<p>Some experts name the <em>Acecard<\/em> the most serious today\u2019s threat to mobile data protection. And this opinion appeared not without the reason. The mobile banking Trojan <em>Acecard<\/em> is able to bring a smartphone owner a lot of troubles in many different areas.<\/p>\n<p>Its main &#8220;specialization&#8221; is phishing &#8211; the substitution of different sites and services. The range of the websites and apps it can substitute is wide. Over 50 financial applications of banks and payment systems, chat rooms (including <em>Viber<\/em>, <em>WhatsApp<\/em>, and <em>Skype<\/em>), and even such &#8220;monsters&#8221; as <em>PayPal<\/em> and <em>Gmail<\/em>, where data protection has always been considered a strong point. Besides, the virus can steal any information &#8211; from the SMS to the credit cards data. It can redirect the calls, &#8220;replace&#8221; a bunch of applications and even install new ones (for example,&nbsp;cryptowares) on the infected device. The mobile banking Trojan <em>Acecard<\/em> may also block the window of any application itself and demand a ransom for returning functionality to the smartphone.<\/p>\n<blockquote><p><strong><em>The virus can steal any information &#8211; from the SMS to the credit cards data. It can redirect the calls, &#8220;replace&#8221; a bunch of applications and even install new ones (for example, cryptowares) on the infected device.<\/em><\/strong><\/p><\/blockquote>\n<p>Usually, Trojan viruses are sent in the form of phishing emails or spam. <em>Acecard<\/em> differs even here: it can disguise itself as the important system applications. Not so long ago it put on a mask of the <em>Adobe Flash Player<\/em>. Regular users who are not IT-specialists didn\u2019t know the production of this player for Android was stopped in 2012 and the hackers took advantage of it. As a result, those who have downloaded the fake <em>Flash Player<\/em> on the smartphone received a mobile banking Trojan and a player icon on the desktop instead.<\/p>\n<h2>How to protect yourself against the Acecard<\/h2>\n<p>If the <em>Acecard<\/em> has already infected the device, it is difficult to do something with it. The only thing you can do to protect yourself against this mobile banking Trojan is simply to prevent the infection. You can do it the next way:<\/p>\n<ol>\n<li>Be careful when installing the program. Check whether the application really exists (search for information about the official version) in order not to get in a situation like that one with the <em>Adobe Flash Player<\/em>. Who knows what software the hackers will use the next time to disguise the Trojan?<\/li>\n<li>Do not download applications from the untrusted sources. Yet, the official store&nbsp;is also not a guarantee of safety in the case of this malware. <em>Acecard<\/em> creators have even learned to bypass the <em>Google Play<\/em> protection. There has been a separate Trojan that used <em>Google&#8217;s<\/em> app store to download the <em>Acecard<\/em> disguised as the smartphone game.<\/li>\n<li>Install a constantly updating powerful antivirus able to detect Acecard-like new threats.<\/li>\n<\/ol>\n<p>Banking institutions and payment system in their turn should take care of the extra level of protection against phishing and interception of the one-time password delivered via SMS or voice calls. As well as complete their systems of multi-factor authentication with an additional function &#8211; data signature <em>CWYS (Confirm What You See)<\/em>. Learn more about this function <a href=\"https:\/\/www.protectimus.com\/blog\/detailed-information-on-data-signing\/\">here<\/a>.<\/p>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>The smartphone has a wide range of functions. Despite its main feature of being a phone, this gadget allows you to listen to the music, read, surf the Internet, pay bills, work with documents, etc. A huge part of personal and business life of our contemporaries is tied to this smart device. Realizing this, the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4428,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[7],"tags":[202,118,166,230],"class_list":["post-1450","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry-news","tag-cybersecurity","tag-data-protection","tag-hacking-attacks","tag-information-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/1450","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=1450"}],"version-history":[{"count":5,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/1450\/revisions"}],"predecessor-version":[{"id":4429,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/1450\/revisions\/4429"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/4428"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=1450"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=1450"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=1450"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}