Android banking malware whitelists itself to stay connected with attackers

Nov 17, 2016 in Uncategorized
New Android.Fakebank.B variants use social engineering to bypass a battery-saving process and stay active in the background.

Twitter Card Style: 

summary

Recent variants of Android.Fakebank.B have been updated to work around the battery-saving process Doze. The variants display a pop-up message asking the user to add the threat to the Battery Optimizations exceptions whitelist.

read more

Source: Symantec