The fingerprint feature has been considered a very strict and sophisticated security system. However, it turns out that this security feature is still at risk of being broken into by a new malware called Chameleon. To avoid the threat of cybercrime, smartphone users need to get to know the Chameleon malware.
The use of fingerprint biometric data as a security key now cannot be guaranteed security. Smartphone users need to be aware of Chamelon malware that can penetrate fingerprint security. This new malware is said to be able to disable the fingerprint sensor feature to steal the user's PIN.
Chameleon malware can reportedly be used by criminals to attack smartphone security from biometrics as key to PIN. That's why it's so important to know Chameleon malware to anticipate this new model of cybercrime.
Chameleon's malware has emerged as a new threat in digital security systems. A team of researchers from ThreatFabric said that this new type of malware works by tricking users into activating accessibility services or accessibility services on smartphones.
This malware disguises itself as a legitimate Android app, then displays an HTML page that directs its victims to enable the accessibility feature. By activating the accessibility service, the Chameleon malware outwits its users automatically converting the security key from biometric or fingerprint to a PIN key on the phone.
When accessibility on smartphones is active, cyber crime actors can bypass various security protections including unlocking using fingerprints. When the victim enters the PIN to access the cellphone, the Chameleon malware will automatically steal the PIN and any passwords that are typed.
The main method of distribution of this type of malware is through an Android (APK) package file whose source is not trusted. Cybercrime with the Chameleon malware is certainly very detrimental to the victim. This attack can steal the victim's personal data for illegal and negative use.
Because of the dangerous risks that can be posed from the Chameleon malware, mobile phone users need to be aware of and anticipate it. To avoid this malware attack, smartphone users must be careful when they want to install and use applications if from unofficial or untrusted sources.
Usually the Chameleon malware is distributed through APK files originating from unofficial sources. So mobile phone users must be careful and not reckless when downloading and installing applications outside of official sources. For example when you install applications from websites or online forums.
In addition, mobile phone users should also not carelessly implement accessibility services for unknown applications. So make sure to use applications from trusted sources, especially the use of banking applications.
Before the Chameleon malware shocked the digital security system, previously there was the Android FjordPhantom malware. This malware targets users in Southeast Asia, such as Indonesia, Vietnam, and Thailand.
Android malware FjordPhantom spreads through messaging services and uses social engineering techniques to deceive its victims. This malware attack targets banking customers. The attack chain is run by utilizing email, SMS, and messaging apps.
Android FjordPhantom malware is sent in APK file form through a number of platforms above to direct users to download fake banking applications. Victims who have been trapped will be directed to a series of steps guided via fake calls. The fraud technique is known as a phone-oriented attack (TOAD).
The characteristic feature of this malware is the ability to run malicious codes undetected. This way of working allows perpetrators to avoid Android protection systems. The attack technique launched by FjordPhantom involves virtualization without requiring root access, thus allowing malware to access sensitive information on victims' smartphones.
Demikian pengusan mengenal malware Chamelon sebagai serangan cyber crime jenis baru yang wajib diwaspadai. Malware ini sangat berbahaya karena bisa membobol sistem keamanan fingerprint atau finger print untuk masuk ke ponsel korban. Baca juga artikel jenis-nis ransomeware dan malware berbahaya.
Stay up to date with the latest domestic and other overseas news on VOI. We present the latest and most updated nationally and internationally.
The English, Chinese, Japanese, Arabic, and French versions are automatically generated by the AI. So there may still be inaccuracies in translating, please always see Indonesian as our main language. (system supported by DigitalSiber.id)