Proofpoint cyber security experts: cybercrime updated key features of the Trojan and employ new distribution mechanisms, including fake apps and switching to Smoke Loader.
Trend Micro cyber security experts: The apps, posing as legitimate voice messenger platforms, have suspicious automated functions. Cybercrime could use them to launch botnet attacks.
Pay maximum attention if you shop online. Cyber criminals prepared a lot of bad tricks to steal money and break your cyber security. From fake apps and gift cards to phishing.