Posted July 20th, 2021 for ESET
BRATISLAVA, KOŠICE July 20, 2021 ESET Research has analyzed an aggressive advertising-based threat Android/FakeAdBlocker which downloads malicious payloads provided by its operator’s command and control server. Android/FakeAdBlocker usually hides its launcher icon after initial launch, delivers unwanted scareware or adult content advertisements, and creates spam events for upcoming months in iOS and Android calendars. These ads often cost their victims money by sending premium rate SMS messages, subscribing to unnecessary services, or downloading Android banking trojans, SMS trojans and malicious applications. Additionally, the malware uses URL shortener services to create links to ads, which in some cases monetize their clicks.
Some URL shortener services distribute Android malware, including banking or SMS trojans welivesecurity.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from welivesecurity.com Daily Mail and Mail on Sunday newspapers.