This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Affected platforms
The following platforms are known to be affected:
Threat details
Both variants aim to steal information such as email addresses, banking credentials and contact information which then are uploaded to Command and Control servers. The Android variant propagates via malicious links posted on social media which advertise a fake adult game. Once this is downloaded it displays a message telling the user the app has failed to download to convince users it is no longer on their device, however the spyware will run in the background and steal the information. The Windows variant is delivered via malicious RAR files downloaded from fake adult sites. This includes a .txt file requesting the user disable their antivirus so they can access and steal the users information.
Remediation advice
To prevent and detect an infection, ensure that:Remediation steps
| Type | Step |
|---|---|
|
Last edited: 17 February 2020 12:47 pm