{"id":290886,"date":"2024-11-01T09:00:00","date_gmt":"2024-11-01T08:00:00","guid":{"rendered":"https:\/\/sftarticles.wpenginepowered.com\/es\/?p=343180"},"modified":"2025-07-01T15:47:37","modified_gmt":"2025-07-01T22:47:37","slug":"this-new-malware-can-hack-your-phone-when-you-contact-your-bank-can-we-trust-the-calls","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/this-new-malware-can-hack-your-phone-when-you-contact-your-bank-can-we-trust-the-calls\/","title":{"rendered":"This new malware can hack your phone when you contact your bank, can we trust the calls?"},"content":{"rendered":"\n<p>We have warned you many times about the dangers of hackers and all the malware lurking on the web. And although many people think we are exaggerating, the new hacker tools justify us warning you over and over again. <strong>The internet world is dangerous, and everyone wants to get a hold of our banking data.<\/strong><\/p>\n\n\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" alt=\"Avast Free Antivirus\" src=\"https:\/\/images.sftcdn.net\/images\/t_app-icon-s\/p\/2d9f9134-96d0-11e6-bf8f-00163ec9f5fa\/1408299994\/avast-Avast_Symbol_V2_Positive_Orange_256x256.png\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">Avast Free Antivirus<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/avast.en.softonic.com\/\" target=\"_self\" rel=\"noopener noreferrer\">DOWNLOAD<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        <svg class=\"rating-score__content\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" x=\"0\" y=\"0\" viewbox=\"0 0 50 50\" enable-background=\"new 0 0 50 50\" xml:space=\"preserve\"><path class=\"rating-score__background rating-score--good\" fill=\"none\" stroke-width=\"6\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><path class=\"rating-score__value rating-score__value--0\" fill=\"none\" stroke-width=\"6\" stroke-dashoffset=\"0\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><text class=\"rating-score__number\" content=\"\" text-anchor=\"middle\" transform=\"matrix(1 0 0 1 25 31.0837)\" data-auto=\"app-user-score\"><\/text><\/svg>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\" onerror=\"this.style.display='none'\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/avast.en.softonic.com\/\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n\n\n\n<p>While calling our bank is common, as many procedures are done over the phone out of necessity or because they are more convenient, there is a new malware that is making this call dangerous, we&#8217;ll tell you about it.<\/p>\n\n\n\n<p>A new malware detected on Android phones might make you think twice before making your next call to the bank. <strong>The trojan application can detect calls to certain banks made from personal phones and redirect them to hackers<\/strong>, without the person making the call being aware of anything.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">The malware can infiltrate Android devices through malicious apps installed using APKs. <a href=\"https:\/\/t.co\/fWRRtOFQTD\">https:\/\/t.co\/fWRRtOFQTD<\/a><\/p>&mdash; PCMag (@PCMag) <a href=\"https:\/\/twitter.com\/PCMag\/status\/1851958637637296241?ref_src=twsrc%5Etfw\">October 31, 2024<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">The malware called FakeCall that can leave your account at $0<\/h2>\n\n\n\n<p>The malware &#8220;FakeCall&#8221; or &#8220;FakeCalls&#8221; has been active for just over two years, according to <a href=\"https:\/\/go.skimresources.com\/?id=111346X1569483&amp;xs=1&amp;url=https:\/\/www.bleepingcomputer.com\/news\/security\/android-malware-fakecall-now-reroutes-bank-calls-to-attackers\/&amp;xcust=2-1-2507191-1-0-0&amp;sref=https:\/\/www.pcworld.com\/article\/2507191\/android-malware-can-hijack-bank-calls-and-reroute-you-to-hackers.html\" target=\"_blank\" rel=\"noopener nofollow\" title=\"\">BleepingComputer<\/a>, but it has recently become more complex and difficult to detect. Although it previously posed as a banking application, the new versions <a href=\"https:\/\/go.skimresources.com\/?id=111346X1569483&amp;xs=1&amp;url=https:\/\/www.zimperium.com\/blog\/mishing-in-motion-uncovering-the-evolving-functionality-of-fakecall-malware\/&amp;xcust=2-1-2507191-1-0-0&amp;sref=https:\/\/www.pcworld.com\/article\/2507191\/android-malware-can-hijack-bank-calls-and-reroute-you-to-hackers.html\" target=\"_blank\" rel=\"noopener nofollow\" title=\"\">detected by the security company Zimperium<\/a> are more complex.<\/p>\n\n\n\n<p><strong>The application is installed as a side-loaded APK, as is often the case with Android malware,<\/strong> and requests permission to become the default call manager, essentially replacing the phone&#8217;s normal dialer app.<\/p>\n\n\n\n<p>The malicious app then runs in the background, <strong>patiently waiting for you to call a known banking phone number<\/strong>. When it detects such activity, it diverts the call to a hacker (who is literally <em>on<\/em> standby for this).<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">Android malware &quot;FakeCall&quot; now reroutes bank calls to attackers &#8211; <a href=\"https:\/\/twitter.com\/billtoulas?ref_src=twsrc%5Etfw\">@billtoulas<\/a><a href=\"https:\/\/t.co\/MyBZXMlaNo\">https:\/\/t.co\/MyBZXMlaNo<\/a><a href=\"https:\/\/t.co\/MyBZXMlaNo\">https:\/\/t.co\/MyBZXMlaNo<\/a><\/p>&mdash; BleepingComputer (@BleepinComputer) <a href=\"https:\/\/twitter.com\/BleepinComputer\/status\/1851637980772868110?ref_src=twsrc%5Etfw\">October 30, 2024<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<p><strong>Next,<\/strong> with the help of a fake visual element to hide the real call destination, <strong>the hacker pretends to be a bank employee to obtain your real banking information.<\/strong> Once you have provided your account number and some personal data, they can empty your accounts at will.<\/p>\n\n\n\n<p>And there are other obfuscation options.<strong> The system allows the hacker to call you directly and impersonate your bank <\/strong>if they see that you are not patient, or perform other tricks remotely.<\/p>\n\n\n\n<p>It is an ingenious and complex system, but <strong>the core of the scam still relies on you downloading an unverified APK<\/strong> and granting permission to an application to replace your phone&#8217;s standard dialer. The new variants of the malware are also capable of monitoring Bluetooth connections and using Android&#8217;s accessibility tools to fake user interface elements.<\/p>\n\n\n\n<p>Zimperium has detected this malware on the network, although <strong>it has not yet appeared in any Google Play Store application<\/strong> (something that happens, but rarely). In the GitHub tools to detect it, a dozen different APK variations are listed, some with seemingly random letter strings, others with innocuous labels like <code>com.securegroup.assistant<\/code>.<\/p>\n\n\n\n<p>As always, and just like with Windows software,<strong> never download Android apps from a source you don&#8217;t trust<\/strong>, it can be the difference between a full bank account and an empty one.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There have been many times we have warned you about the dangers of hackers and all the malware lurking on the internet. And although many people think we are exaggerating, the new hacker tools justify us warning you again and again. The internet world is dangerous, and everyone wants to get hold of our banking data. While calling our bank is common, as many procedures are done over the phone out of necessity or convenience, there is a new malware that is making this call dangerous, and we are telling you about it. A new malware [&#8230;]<\/p>\n","protected":false},"author":9265,"featured_media":290895,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":2},"categories":[1015],"tags":[],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-290886","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/290886","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/9265"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=290886"}],"version-history":[{"count":1,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/290886\/revisions"}],"predecessor-version":[{"id":310971,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/290886\/revisions\/310971"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/290895"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=290886"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=290886"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=290886"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=290886"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=290886"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=290886"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}