Thousands of Android users have been targeted by a new scam using Flubot malware around Europe to Australia
A malware called Flubot has been attacking thousands of users from Australia through text message scams. The malware is basically intended to be installed on the mobile devices of the victims. Even though Android devices are the initial target of Flubot, it’s been reported that iOS users can receive phishing text messages but would not work on them. The text message includes a fake link that pushes the receiver to click – stating that they have missed a call or received an important voicemail.
Once clicked, the link will be redirected to the device’s browser and open a website that will look like an original brand landing page. Telstra company is the most frequent fake page that opens from those in Australia, but in Europe, different parcel delivery firms can show up. Afterward, the user will be instructed to install specific software to hear the supposedly important message.
The malware will then be installed when the victim agrees to the instruction and permits access to their devices. From here, the threat actors have successfully intruded the target’s device and steal a lot of private information from them, including credit card details, personal data, read text messages, open browser applications. Basically, all of the other information they want to embezzle against the victim. In addition to this, the malware can also access the victim’s contact list to gain more inventory of possible targets.
Telstra advises victims to conduct a factory reset to their devices and restore the device to the previous version before the one that has been infected, even though there are other manual ways to remove the Flubot malware.
Before Australia, Europe was the first one to be attacked by this malware. According to the Australian Competition and Consumer Commission, there were reports that over 3,700 testimonies about the attack have been received by Scamwatch since its first-ever report last August 4 this year. Victims were highly directed to contact ReportCyber, Scamwatch, and IDCare if they have been attacked and victimized by any kind of cybercrimes.