{"id":3207,"date":"2020-09-28T08:58:28","date_gmt":"2020-09-28T06:58:28","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=3207"},"modified":"2024-05-15T11:37:21","modified_gmt":"2024-05-15T09:37:21","slug":"cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/en\/cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild\/","title":{"rendered":"Cerberus out, Alien malware in &#8211; there is a new and dangerous Android banking trojan in the wild"},"content":{"rendered":"\n<p>Alien malware is a newly discovered banking trojan with an advanced ability to bypass two-factor authentication (2FA). There is more than 200 mobile apps imitated by this new threat including Bank of America and Microsoft Outlook. More about the Alien malware you can find below.<\/p>\n\n\n\n<!--more-->\n\n\n\n<div style=\"height:45px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-1\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"new-alien-malware-can-steal-passwords-from-226-android-apps\"><strong>New <em>Alien malware<\/em> can steal passwords from 226 Android apps<\/strong><\/h2>\n\n\n<p>Security researchers have discovered and analyzed a new strain of Android malware that comes with a wide array of features allowing it to steal credentials from 226 applications.<\/p>\n\n\n\n<p>Named Alien, this new trojan has been active since the start of the year and has been offered as a Malware-as-a-Service (MaaS) offering on underground hacking forums. According to researchers from ThreatFabric, Alien is not truly a new piece of code but was actually based on the source code of a rival malware gang named Cerberus. But is way more advanced than his \u201cfather\u201d.&nbsp;<\/p>\n\n\n\n<p>Alien is part of a new generation of Android banking trojans that have also integrated remote-access features into their codebases. It shows fake login screens and collects passwords for various apps and services, but it can also grant the hackers access to devices to use said credentials or even perform other actions.<\/p>\n\n\n<h5 class=\"wp-block-heading\" id=\"alien-boasts-the-following-capabilities\">Alien boasts the following capabilities:<\/h5>\n\n\n<ul class=\"wp-block-list\"><li>Can overlay content on top of other apps (a feature used for phishing login credentials)<\/li><li>Log keyboard input<\/li><li>Provide remote access to a device after installing a TeamViewer instance<\/li><li>Harvest, send, or forward SMS messages and forward calls<\/li><li>Steal contacts list, collect device details, geo-location data, and app lists<\/li><li>Make USSD requests<\/li><li>Install and start other apps<\/li><li>Lock the screen for a ransomware-like feature<\/li><li>Sniff notifications showed on the device<\/li><li>Steal 2FA codes generated by authenticator apps<\/li><\/ul>\n\n\n\n<p>Researchers said they found that Alien had support for showing fake login pages for 226 other Android applications &#8211; e-banking apps, email, social, instant messaging, and cryptocurrency apps. Including Gmail, Facebook, Twitter, Snapchat, WhatsApp, etc. Most of the banking apps targeted by Alien developers were for financial institutions based mostly in Spain, Turkey, Germany, the US, Italy, France, Poland, Australia, and the UK.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><img decoding=\"async\" width=\"602\" height=\"301\" src=\"https:\/\/lh5.googleusercontent.com\/gTvDnQow8D3iGGS-E12O3Zxh5jCnzlWrcSU6-F5mL_puVPBfFpWF5xMgOhLCIFtD3wV-wGVFbTx3OOBVhuDXqqrKgWH8cd_BiFFzawfl1FsRR1J-08Tvps3PpwMEo5NywvrnG-pi\"><\/p>\n\n\n\n<p>Researchers didn&#8217;t include details about how Alien makes its way onto users&#8217; devices, primarily because this varies based on how the Alien MaaS customers (other criminal groups) chose to distribute it. We know about phishing sites recommending downloading fake software updates or Corona apps and SMS. How to stay safe? Well better don&#8217;t install apps from shady sites and grant them admin rights.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.zdnet.com\/article\/new-alien-malware-can-steal-passwords-from-226-android-apps\/#ftag=RSSbaffb68\" target=\"_blank\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:45px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-2\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"unsecured-microsoft-bing-server-leaks-65tb-of-data\"><strong>Unsecured Microsoft Bing server leaks 6,5TB of data<\/strong><\/h2>\n\n\n<p>An unsecured database has exposed sensitive data for users of Microsoft\u2019s Bing search engine mobile application \u2013 including their location coordinates, search terms in clear text, and more.&nbsp;<\/p>\n\n\n\n<p>While no personal information, like names, were exposed, researchers with Wizcase argued that enough data was available that it would be possible to link these search queries and locations to user identities \u2014 giving bad actors information ripe for blackmail attacks, phishing scams, and more.<\/p>\n\n\n\n<p>The data was related to the mobile-app version of Microsoft Bing, housed in a 6.5 terabyte (TB) server owned by Microsoft, believed to contain 13 billion records. The server was exposed online from September 10 to September 16.&nbsp;<\/p>\n\n\n\n<p>The researchers noted that there have been more than 10 million downloads of the Bing app on Google Play alone, with millions of mobile searches performed daily. Anyone who has made a Bing search with the mobile app while the server has been exposed is at risk. Researchers noticed records of people searching from over 70 countries.&nbsp;<\/p>\n\n\n\n<p>They also claim that between Sept. 10 through Sept. 12, and on Sept. 14, the server was targeted by a \u201c<a href=\"https:\/\/xopero.com\/blog\/en\/prometei-the-new-botnet-uses-windows-smb-to-mine-monero\/#paragraph-3\" target=\"_blank\" rel=\"noreferrer noopener\">Meow attack<\/a>\u201d that deleted nearly the entire database.<\/p>\n\n\n\n<p>In addition to the Meow hackers, this data was potentially exposed to other types of hackers and scammers, which could lead to a variety of blackmailing and phishing attacks against users of the Bing mobile app.&nbsp; The exposure of location data could also open victims up to physical attacks or robberies, researchers said.<\/p>\n\n\n\n<p><a href=\"https:\/\/threatpost.com\/microsoft-bing-search-queries\/159407\/\" target=\"_blank\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:45px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-3\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"agelocker-ransomware-targets-qnap-nas-devices-now-and-steals-data\"><strong>AgeLocker ransomware targets QNAP NAS devices now and steals data<\/strong><\/h2>\n\n\n<p>The group behind the AgeLocker ransomware has been targeting publicly exposed QNAP NAS devices and encrypting their files since the end of August 2020. This is an ongoing worldwide campaign.<\/p>\n\n\n\n<p><strong>Few words about AgeLocker.<\/strong> The ransomware utilizes an encryption algorithm called Age (Actually Good Encryption) designed to replace GPG for encrypting files, backups, and streams. When encrypting files, it prepends a text header to the encrypted data that starts with the URL 'age-encryption.org&#8217;. Hackers also leave behind a ransom note named HOW_TO_RESTORE_FILES.txt that tells the victim that their QNAP device was specifically targeted in the attack.<\/p>\n\n\n\n<p class=\"has-light-gray-background-color has-background\"><em>Unfortunately, a malware has infected your QNAP and a large number of your files have been encrypted using a hybrid encryption scheme.<\/em><\/p>\n\n\n\n<p>The attackers state they first stole unencrypted files that contain &#8222;medical data, scans, backups, etc.&#8221;<\/p>\n\n\n\n<p>Not much information is shared about these attacks. It is unknown how much attackers are demanding as a ransom or how they are gaining access to the QNAP devices. Unfortunately, there is no way to recover files encrypted by AgeLocker for free.<\/p>\n\n\n\n<p>But by following these steps you can secure your device and protect your company against this and future attacks.<\/p>\n\n\n\n<p>First, make sure you are running the latest firmware and vulnerabilities have been patched: Next:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Change all passwords for all accounts on the device.<\/li><li>Remove unknown user accounts from the device.<\/li><li>Make sure the device firmware is up-to-date, and all of the applications are also updated.<\/li><li>Remove unknown or unused applications from the device.<\/li><li>Set an access control list for the device.<\/li><li>Deploy a fully configurable <a href=\"https:\/\/xopero.com\" target=\"_blank\" rel=\"noreferrer noopener\">backup solution<\/a> that can keep your data safe &#8211; and more importantly, your backup copies out of the ransomware reach.<\/li><\/ol>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/agelocker-ransomware-targets-qnap-nas-devices-steals-data\/\" target=\"_blank\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/xopero.com\/products\/xopero-qnap-appliance\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" src=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/08\/580-x-400-en.jpg\" alt=\"\" class=\"wp-image-3006\" width=\"507\" height=\"350\" srcset=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/08\/580-x-400-en.jpg 580w, https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/08\/580-x-400-en-300x207.jpg 300w\" sizes=\"(max-width: 507px) 100vw, 507px\" \/><\/a><\/figure>\n\n\n\n<div style=\"height:45px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-4\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"hacker-supergroup-involved-in-bomb-threats-ransomware-and-sim-swapping-has-been-shut-down-by-the-polish-police\"><strong>Hacker super-group involved in bomb threats, ransomware, and SIM swapping has been shut down by the Polish police<\/strong><\/h2>\n\n\n<p>Polish authorities have shut down a hacker super-group that has been involved in ransomware attacks, malware distribution, SIM swapping, banking fraud, running fake online stores, and even making bomb threats at the behest of paying customers.<\/p>\n\n\n\n<p>Four suspects were arrested this week and four more are under investigation.<\/p>\n\n\n\n<p>The hackers have been under investigation since May 2019, when they sent a first bomb threat. During the investigation, police discovered that an individual named Lukasz K. found the hackers on internet forums and hired them to send a bomb threat to the local school, but make the email look like it came from a rival business partner. The man whose identity was spoofed in the email was arrested and spent two days in prison before police figured out what happened. When the framed businessman was released out of jail, he hired a private investigator to track down the culprits behind the fake bomb alert. When the hackers realized what was happening, they then hacked a Polish mobile operator and generated invoices for thousands of zlotys (the Polish currency) in the name of both the detective and the framed businessman.<\/p>\n\n\n\n<p>The biggest case connected to the group took place on June 26 and 27, 2019, when they were hired to send bomb threats to 1,066 kindergartens across Poland.<\/p>\n\n\n<h5 class=\"wp-block-heading\" id=\"many-ways-to-achieve-one-goal\">Many ways to achieve one goal&#8230;<\/h5>\n\n\n<p>But this wasn&#8217;t the group&#8217;s only method of income. The hackers distributed also malware &#8211; Cerberus, Anubis, Danabot, Netwire, Emotet, and njRAT &#8211; via email phishing attacks &#8211; the group was linked to 87 different domains used to distribute malware.&nbsp;<\/p>\n\n\n\n<p>Hackers stole from infected users personal details, which they&#8217;d use to steal money from banks with weak security next. In case some banks had implemented multiple authentication mechanisms, the group would then use the information they stole from infected victims to order fake IDs from the dark web, and then use the IDs to trick mobile operators into transferring the victim&#8217;s account to a new SIM card. Using this SIM card, the hackers would then reset passwords for the victim&#8217;s online accounts or bypass two-factor authentication (2FA) to steal money from victims.<\/p>\n\n\n\n<p>The group was able to steal 199,000, 220,000 and 243,000 zlotys ($50,000, $56,000, and $62,000) in three separate incidents using this technique. The next attempt \u2013 worth 7.9 million zlotys ($2 million) was less fortunate.&nbsp;<\/p>\n\n\n\n<p>The group also created 50 fake online stores where they sold nonexistent products to defraud more than 10,000 buyers.<\/p>\n\n\n\n<p>Europol in a press release suggested that hackers most likely made victims outside Poland as well.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.zdnet.com\/article\/polish-police-shut-down-hacker-super-group-involved-in-bomb-threats-ransomware-sim-swapping\/\" target=\"_blank\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:45px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-5\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"do-you-have-thirst-for-knowledge-there-is-ten-more-cybersecurity-stories-below\">Do you have thirst for knowledge? There is ten more cybersecurity stories below<\/h2>\n\n\n<p>1. Instagram bug allowed crashing the app via image sent to device (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/instagram-bug-allowed-crashing-the-app-via-image-sent-to-device\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bleeping Computer<\/a>)<br>2. Cisco Patch-Palooza Tackles 29 High-Severity Bugs (<a href=\"https:\/\/threatpost.com\/cisco-patches-bugs\/159537\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Post<\/a>)<br>3. New ransomware actor OldGremlin uses custom malware to hit top orgs (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-ransomware-actor-oldgremlin-uses-custom-malware-to-hit-top-orgs\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bleeping Computer<\/a>)<br>4. Google Chrome Bugs Open Browsers to Attack (<a href=\"https:\/\/threatpost.com\/google-chrome-attack\/159466\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Post<\/a>)<br>5. CISA\u2019s advisory warns of notable increase in LokiBot malware (<a href=\"https:\/\/securityaffairs.co\/wordpress\/108630\/malware\/cisa-lokibot-surge.html\" target=\"_blank\" rel=\"noreferrer noopener\">Security Affairs<\/a>)<br>6. German investigators blame Russian DoppelPaymer gang for deadly hospital attack (<a href=\"https:\/\/securityaffairs.co\/wordpress\/108620\/malware\/doppelpaymer-german-hospital-attack.html?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=doppelpaymer-german-hospital-attack\" target=\"_blank\" rel=\"noreferrer noopener\">Security Affairs<\/a>)<br>7. Google Cloud Buckets Exposed in Rampant Misconfiguration (<a href=\"https:\/\/threatpost.com\/google-cloud-buckets-exposed-misconfiguration\/159429\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Post<\/a>)<br>8. Microsoft Says Hackers Actively Targeting <a href=\"https:\/\/xopero.com\/blog\/en\/zerologon-flaw-lets-hackers-take-over-the-entire-network\/\">Zerologon<\/a> Vulnerability (<a href=\"https:\/\/www.securityweek.com\/microsoft-says-hackers-actively-targeting-zerologon-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">SecurityWeek<\/a>)<a href=\"https:\/\/www.securityweek.com\/microsoft-says-hackers-actively-targeting-zerologon-vulnerability\"><br><\/a>9 The Windows XP source code was allegedly leaked online (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/the-windows-xp-source-code-was-allegedly-leaked-online\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bleeping Computer<\/a>)<br>10. SMS phishing scam pretends to be Apple \u201cchatbot\u201d \u2013 don\u2019t fall for it! (<a href=\"https:\/\/nakedsecurity.sophos.com\/2020\/09\/24\/sms-phishing-scam-pretends-to-be-apple-chatbot-dont-fall-for-it\/\" target=\"_blank\" rel=\"noreferrer noopener\">Naked Security<\/a>)<\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Alien malware is a newly discovered banking trojan with an advanced ability to bypass two-factor authentication (2FA). There is more than 200 mobile apps imitated by this new threat including Bank of America and Microsoft Outlook. More about the Alien malware you can find below.<\/p>\n","protected":false},"author":1,"featured_media":2447,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[470],"tags":[],"class_list":["post-3207","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersec-news","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cerberus out, Alien malware in - there is a new and dangerous Android banking trojan in the wild - Xopero Blog<\/title>\n<meta name=\"description\" content=\"Alien malware is a newly discovered banking trojan with an advanced ability to bypass two-factor authentication (2FA). There is more than 200 mobile apps...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/en\/cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cerberus out, Alien malware in - there is a new and dangerous Android banking trojan in the wild - Xopero Blog\" \/>\n<meta property=\"og:description\" content=\"Alien malware is a newly discovered banking trojan with an advanced ability to bypass two-factor authentication (2FA). There is more than 200 mobile apps...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/en\/cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-28T06:58:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-15T09:37:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1843\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"xopero_blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"xopero_blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild\\\/\"},\"author\":{\"name\":\"xopero_blogger\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\"},\"headline\":\"Cerberus out, Alien malware in &#8211; there is a new and dangerous Android banking trojan in the wild\",\"datePublished\":\"2020-09-28T06:58:28+00:00\",\"dateModified\":\"2024-05-15T09:37:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild\\\/\"},\"wordCount\":1520,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"articleSection\":[\"Cybersec news\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild\\\/\",\"name\":\"Cerberus out, Alien malware in - there is a new and dangerous Android banking trojan in the wild - Xopero Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"datePublished\":\"2020-09-28T06:58:28+00:00\",\"dateModified\":\"2024-05-15T09:37:21+00:00\",\"description\":\"Alien malware is a newly discovered banking trojan with an advanced ability to bypass two-factor authentication (2FA). There is more than 200 mobile apps...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"width\":1843,\"height\":481},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cerberus out, Alien malware in &#8211; there is a new and dangerous Android banking trojan in the wild\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\",\"name\":\"xopero_blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"caption\":\"xopero_blogger\"},\"sameAs\":[\"https:\\\/\\\/xopero.com\"],\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/xopero_blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cerberus out, Alien malware in - there is a new and dangerous Android banking trojan in the wild - Xopero Blog","description":"Alien malware is a newly discovered banking trojan with an advanced ability to bypass two-factor authentication (2FA). There is more than 200 mobile apps...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/en\/cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild\/","og_locale":"pl_PL","og_type":"article","og_title":"Cerberus out, Alien malware in - there is a new and dangerous Android banking trojan in the wild - Xopero Blog","og_description":"Alien malware is a newly discovered banking trojan with an advanced ability to bypass two-factor authentication (2FA). There is more than 200 mobile apps...","og_url":"https:\/\/xopero.com\/blog\/en\/cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2020-09-28T06:58:28+00:00","article_modified_time":"2024-05-15T09:37:21+00:00","og_image":[{"width":1843,"height":481,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","type":"image\/png"}],"author":"xopero_blogger","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"xopero_blogger","Szacowany czas czytania":"8 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/en\/cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/en\/cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild\/"},"author":{"name":"xopero_blogger","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c"},"headline":"Cerberus out, Alien malware in &#8211; there is a new and dangerous Android banking trojan in the wild","datePublished":"2020-09-28T06:58:28+00:00","dateModified":"2024-05-15T09:37:21+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild\/"},"wordCount":1520,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","articleSection":["Cybersec news"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/en\/cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild\/","url":"https:\/\/xopero.com\/blog\/en\/cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild\/","name":"Cerberus out, Alien malware in - there is a new and dangerous Android banking trojan in the wild - Xopero Blog","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","datePublished":"2020-09-28T06:58:28+00:00","dateModified":"2024-05-15T09:37:21+00:00","description":"Alien malware is a newly discovered banking trojan with an advanced ability to bypass two-factor authentication (2FA). There is more than 200 mobile apps...","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/en\/cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/en\/cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/en\/cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","width":1843,"height":481},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/en\/cerberus-out-alien-malware-in-there-is-a-new-and-dangerous-android-banking-trojan-in-the-wild\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"Cerberus out, Alien malware in &#8211; there is a new and dangerous Android banking trojan in the wild"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c","name":"xopero_blogger","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","caption":"xopero_blogger"},"sameAs":["https:\/\/xopero.com"],"url":"https:\/\/xopero.com\/blog\/author\/xopero_blogger\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3207","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=3207"}],"version-history":[{"count":8,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3207\/revisions"}],"predecessor-version":[{"id":5824,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3207\/revisions\/5824"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/2447"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=3207"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=3207"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=3207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}