"Chameleon Android Trojan: Stealing PINs by Bypassing Biometric Authentication"

1 min read
Source: The Hacker News
"Chameleon Android Trojan: Stealing PINs by Bypassing Biometric Authentication"
Photo: The Hacker News
TL;DR Summary

A new variant of the Android banking malware called Chameleon has been discovered, expanding its targeting to users in the U.K. and Italy. This evolved version of Chameleon excels in executing Device Takeover (DTO) using the accessibility service and is now being delivered via Zombinder, a dropper-as-a-service. The malware masquerades as the Google Chrome web browser and tricks users into enabling the accessibility service by checking the Android version on the device. It also disrupts biometric operations by transitioning the lock screen authentication mechanism to a PIN, allowing the malware to unlock the device at will. This development highlights the sophisticated and adaptive nature of the Android threat landscape.

Share this article

Reading Insights

Total Reads

0

Unique Readers

1

Time Saved

3 min

vs 4 min read

Condensed

83%

656109 words

Want the full story? Read the original article

Read on The Hacker News