We all know very well that paying for purchases with your mobile is very convenient.
But in most situations, the advantages have some drawback.
Once again, cybercriminals focus their efforts on this jot down of users thanks to the Cron banking Trojan.

Cron-Linked Malware Impersonates 2200 Banking Apps
Paying for purchases with your mobile is very convenient.
But in most situations, the advantages have some drawback.
Once again, cybercriminals focus their efforts on this punch in of users thanks to the Cron banking Trojan.

Security experts link this threat to the group of cybercriminals Cron.
It is not a threat that we can consider new.
Earlier this year, its owners were able to get an amount close to $900,000.

The routes of diffusion do not vary in excess.
Security experts from the company Avast confirm that they are using unofficial utility stores to distribute this banking Trojan.
They are making it happen through legitimate applications.
When the user installs the software, it is identified as System software.
At the time of installation, the user is required to approve a large number of permits.
That should be the key to continue or cancel the process.
Superimpose a form to the legitimate one.
The result: When you press the login button, the information is collected on servers owned by cybercriminals.
A very effective strategy that allows cybercriminals to cover a large number of applications, but without excessive effort.
This threat already appeared at the beginning of the year with a quite satisfactory result for the cybercriminals.
The reality is that not only this threat makes use of this practice.
All of them share the same way of acting when it comes to stealing information.
If it is installed we should find it running.
So, what do you think about this threat?
Simply share your views and thoughts in the comment section below.