As customers shifted to mobile banking, the focus of mobile malware also changed.
Threat actors began to execute attacks on the infected device using overlays to phish data and two-factor authentication (2FA) tokens from victims. Tactics evolved further with automated transaction scripts that run all actions on the infected device and “drive” the legitimate mobile banking application to enter and approve transactions.
This report accompanies the Mobile Malware Roundtable for the European Financial Industry organised by Intel 471 and Threat Fabric.
In this whitepaper we discuss :
- Mobile malware from the perspective of the cybercrime underground
- Financially motivated threat actors that operate in this ecosystem
- Products and services concerned and offered, and the actors who work around them
Download the whitepaper to learn about the products and services associated with mobile malware attacks.