Why is it in the news?
- Cybersecurity researchers have identified a powerful variant of the ‘Chameleon Trojan’ malware, posing a significant threat to Android device users.
About Chameleon Trojan Malware
- Capable of infiltrating devices with minimal detection, particularly targeting biometric authentication features like fingerprint security and face unlock.
- The malware has the ability to elude detection by common malware scanning applications.
- Attaches itself to legitimate Android apps such as Google Chrome to remain undetected, operating in the background.
- Chameleon Trojan bundles operate stealthily at runtime, bypassing Google Protect alerts and security software on the device.
- Adapts tactics based on the Android version targeted, exploiting the Accessibility service in older versions and using deceptive HTML pages in recent versions.
- Steals on-screen content, gains additional permissions, and captures PINs and passwords entered by users to unlock their devices.
- Uses stolen PINs to unlock devices in the background, facilitating the theft of sensitive information like credit card passwords and login credentials.
- Collects information on users’ app usage habits to launch attacks when the device is least likely to be in use.
Measure to be taken
- Crucial to refrain from installing Android apps from unofficial sources.
- Users should exercise caution and avoid enabling the ‘Accessibility service’ for unknown or untrusted apps.
- Install and regularly use trusted anti-virus software to conduct security scans and identify potential threats.