It’s a Scam!

Ring, ring…

‘’Hello, who is this?’’

‘’Hi, my name is Jack and I am calling from the company Onis, a software company that provides antivirus solutions.’’

‘’Yes, and how can I help you?

‘’Well, our data shows that you PC has been infected with a very dangerous malware that can make serious damage to your device. I am here to help you install our software that will fix the issue. Just follow these instructions…’’

 

How many of you would believe this was a legitimate call?

 

If you had, you would have allowed them to connect to your PC and maybe even give them your passwords and other credentials. Boom! They get an easy access to your private data.

Another possibility is that they would charge you for their fake services when in reality your device was never infected in the first place.

We have all heard of email scams. Previously, in the past they were highly popular. You get an email saying your rich cousin left you a big inheritance. 😮 Or, you get an email from someone asking you to help them transfer an enormous amount of money to a specific bank account promising you would get half of the money.

And the most famous one – a gift card! You get an email claiming you won a gift card or even a better one – you won the lottery! (But if you never played, how could you win? Hmm :s)

Don’t get us wrong. Scammers did not give up on emails, but they simply evolved over time and are using other methods as well. They are now targeting your phones too.

Very Successful Tactic

We are talking about phone scam tactics that became very popular lately. Here is how it works.

You can get a phone call from someone claiming to represent a company and offering different services or assistance. At the same time, the company in question has no idea that somebody is using them for their bad intentions.

Some scammers go even further…

A girl in USA received a phone call, where a scammer claimed her father had a car accident and she needed to send money urgently for the hospital expenses.

You can see how dangerous this can be, because scammers prey on our emotions such as fear, trust and excitement.

Many people would get shocked and would not realize this is a fake phone call. That is why phone scams are one of the big problems right now. They’re much more effective than email scams.

Hope, Desire, Fear, Excitement

Latest researches showed that we are most prone to becoming a victim of scams when we are emotional. Scammers are aware of this and they are intentionally exploiting our emotions.

Four emotions they mostly prey on are: hope, desire, fear and excitement. How? By using different forms of manipulation and flattery to tap into our innermost desires and fears. The goal is to get our trust. Once they have it, they can get all information they need and perform their shams.

Some Data

  1. [bctt tweet=”There Were Over 30,200 Internet Scams in 2018 by August”]
  2. [bctt tweet=”Mobile Phone-Related Scam Calls Saw Approximately a 25-Percent Jump Since 2017″]
  3. [bctt tweet=”In 2017, only 3.7 percent of calls to cell phones were fraudulent. This year, that number reached 29.2 percent — and it’s expected to climb to 44.6 percent in 2019″]

We Were No Exception

Few days ago, some of our users started reporting that Zemana representatives called them via phone trying to persuade them they were infected with malware. They offered their assistance by advising them to install Zemana products.

We were very confused because we knew that such practices were never a part of our company’s culture and there was no way any of our team members would be involved in similar tactics.

Soon after that, one of our colleagues found this website: https://www.isupportnumber.com/zemana-antivirus-customer-service.

This website gives false information about our customer service.

fakewebsiteinfo

It became clear this was all a scam. That is why we kindly ask you to be very careful if you receive a phone call from anyone who claims to be a Zemana representative. You should immediately report this to us via email: support@zemana.com.

Also, keep in mind that information you get on the Internet does not necessarily need to be true or correct.

Here are the only ways in which you can reach us and get assistance from our team:

– Email (support@zemana.com, zms@zemana.com)
Help Section on our website (you can raise a ticket and receive a reply via email)
– Live Chat on our website
– Remote assistance (in certain cases, our developers need to remotely connect to your device and resolve the issue)

Ways to Protect Yourself

  1. Be aware that Scams are a Real Threat

The first thing you need to do is become aware and read as much as you can about email, phone and other Internet scams to understand it better and predict potential scenarios that might happen to you. The second thing you need to do is be more cautious when dealing with people on different social networks. Don’t accept everyone who adds you to their friends list and don’t trust everyone who texts or calls you.

  1. Always Double – Check

If you receive a message, email or a phone call from someone you don’t know, don’t immediately believe everything they say and don’t immediately do what they advise you to do. Always double-check. Call your friends or family members and check if they really left that inheritance money to you (deep down you know they didn’t. :p).

  1. Don’t Trust Every Customer Service

Don’t always believe phone calls about your computer. Scammers will offer to provide remote access. Often, they mention popular companies to make you believe them. Don’t! Scammers often offer help to fix an issue by persuading you to install a free upgrade, which is, in fact a virus that will give them your passwords and personal details. Instead, hang up and call or send an email to that company and ask them if it was really somebody from their team who called you or not.

  1. Be Careful When Shopping Online

Beware of offers that seem too good to be true, and always use an online shopping service that you know and trust. Think twice before using virtual currencies (like Bitcoin) – they do not have the same protections as other transaction methods, which means you can’t get your money back once you send it.

 

In the end, all we can say is that the greatest defense you have against phone call scams is yourself. It’s always better to double-check everything because there is now crying over spilled milk.

Or, the next time your phone rings and an unknown person tries to offer something unusual services or aid, you can simply hang up!

 

 

 

New Banking Malware Found on Google Play

New Target – Users From Brazil

Malware authors have always used different apps to disguise Banking Trojans and place them on Google Play Store. Security researchers have found a new strain of malware targeting banking apps on Android devices. This time a new malware banking family is targeting users from Brazil. It is distributed through Google Play as well as through Facebook in the shape of promoted ads.

What Is The Threat All About?

This Android malware impersonates the performance of the following apps: Clean Droid with over 500 installs, Quem viu teu perfil with over 10,000 installs and MaxCupons with over 1,000 installs. To stay under the radar, the app can only be downloaded and installed in Brazil.

alala5

 

laaal5

 

lalaal3

When Was It Released?

The malicious app was most probably released in September 2018. The earliest recorded infiltration has been available for more than a month. Clean Droid infiltration is also distributed on Facebook. There are two Clean Droid pages created on Facebook in October 2018 using identical profile picture as the app on Google Play. One of the pages uses Sao Paulo, Brazil as their address to attract more people from that region.

Targeted Apps

The sole purpose of the new Android malware is to fool users and make them enter their credentials, so it can steal them. This is its primary focus. This Trojan family does not only target one app. It targets different apps such as shopping apps, financial and banking apps as well as entertainment apps. The estimated number is around 26 different apps. It hides inside these apps and has a complex functionality.

Here Is How You Can Protect Yourself

1) Only download apps from Google Play – malicious apps are much more common on third-party app stores, where they are rarely removed even when detected, unlike on Google Play

2) Before downloading apps from Google Play, make sure to check its ratings, reviews and the number of downloads

3) Pay attention to what permissions you grant to the apps you install

4) If you don’t use an app, uninstall it – simply, get rid of it. The fewer apps you have on your phone, the fewer chances an attacker will invade it.

5) Always keep your Android device updated and use a reliable mobile security solution. Our Zemana Mobile Antivirus is a lightweight but strong app that will keep your mobile device safe without overloading your system.

6) Turn off Wi-Fi and Bluetooth connections when you are not using them.

 

Let us know if this article was helpful of interesting to you!

Also, feel welcomed to sign up to our Zemana forum! Here, you can join different discussions and ask all about Zemana products and meet other Zemana users.

Stay safe with Zemana! 🙂

 

 

 

 

 

 

 

 

How to Remove AndroRAT?

AndroRAT – What Is It And How To Remove It?

AndroRAT is a contraction of Android and RAT (Remote Access Tool). It is a piece of malware we have seen a lot lately. At first it was created as a proof of concept. However, this malware has gradually become more evolved over the years. It allows a remote attacker the control over the victim.

Usually the RATs have a user-friendly control panel that makes it possible to control the victims. As a result, AndroRAT can control the infected device by making phone calls and sending SMS messages as well as getting its GPS coordinates. It can also access the files stored on the handset and easily activate and use both the microphone and the camera.

How Does It Work?

The new version of this malware has an ability to gain some advance level privileges on any Android device that unpatched Remote code execution vulnerability CVE-2015-1805 and inject root exploits.

It exploits the critical vulnerabilities on the targeting platform.

What Is So Special About AndroRAT?

Apart from Android, AndroRat can also target Windows and macOS platforms. RAT will communicate with the command and the control server which is controlled by the attacker. It will perform various commands to steal the user’s sensitive information.

Some of these commands are stealing your contact list, your GPS location, your files, messages from your inbox, your WiFi passwords, etc. It can upload files to your device, record audio and capture your screen.

The implanted AndroRAT allows an attacker to remotely control it. This means, the attacker can monitor and make calls and messages. Similarly, he can easily activate the camera and microphone, and access stored files.

How To Prevent AndroRAT From Infecting My Phone?

In terms of security Android is much safer to use then its Windows counterpart – but it is by no means impenetrable. Therefore, you should be careful when downloading different apps because a large number of positive reviews is not always an indication that an app is safe.

To prevent this or any other type of malware from infecting your phone, it is crucial to have an antivirus installed as a basic protection. Above all, keeping your Android device up to date with the latest updates is vital for its security!

AndroRAT Removal

Most antivirus apps are able to detect AndroRAT as it is one of the most known Android hack tools.

If you are using Zemana Mobile Antivirus premium version, it will certainly protect you by blocking hackers’ attempts of hacking your phone. This way, you will keep your mobile device safe. Zemana Mobile Antivirus comes with 15-days free trial.

Zemana Mobile Antivirus as a AndroRAT Removal Tool

If you are looking for a solution that will help you detect and remove AndroRAT, try our Zemana Mobile Antivirus.

  • STEP 1: Download Zemana Mobile Antivirus here.
  • STEP 2: Press the “Full Scan” button.

Download Zemana Mobile Antivirus

  • STEP 3: Waiting for the scanning process to finish (if at any point you wish to cancel the process, click on the ”Abort Scan” button in the footer).

Remove AndroRAT

  • STEP 4: FinallyZemana Mobile Antivirus will notify you if any threats have been detected so you can remove them.

Mobile Security in 2017: Android Has the Largest Number of Potential Victims!

Today, it is almost impossible to imagine life without mobile phones. Sometimes, we are not even aware of the amount on which we rely on our phones every day. The Internet allows us to be connected 24/7, having a constant access to different people and new information.

We use our phones for fun activities but also do to business on a daily basis. Smart devices have replaced traditional payments, so today we make financial transactions remotely using our phones.

This means, that we are constantly storing sensitive and private information. Therefore, it should not come as a surprise that hackers today are focused on our mobile phones. New threats are being created every day, not just to infect our PCs but our phones as well. However, most of people are unaware of this.

They believe they don’t need an antivirus protection on their phones, which makes them easy targets. To decrease the number of potential victims, it is important to raise the awareness about mobile security. Currently, the most popular malware is mobile ransomware and the number of its victims increases every year.

Mobile Ransomware

Ransomware is a type of malware that locks your computer or a mobile device, or encrypts your files, holding them ransom until you pay a fee to the cyber-criminals who hold them hostage.

However, even though we are all aware of this threat and many of us have secured our PCs, mobile ransomware has gone almost unnoticed.

Many people get easily infected because they do not know that mobile ransomware is often disguised as a legitimate mobile application or a popular game.

What is also specific about mobile ransomware is that it can hijack the PIN you used to secure your phone and disable your access to it. This way, you are powerless until you pay the hackers or unless you buy a new phone.

However, even if you pay, there is no guarantee that hackers will unlock your phone or decrypt your files.

Mobile Malware

Mobile malware is malicious software that targets mobile phones or wireless-enabled Personal digital assistants (PDA), by causing the collapse of the system and loss or leakage of confidential information.

The risk from mobile malware is constantly growing. In 2016, the most popular type was a banking Trojan, which steals money from mobile users’ bank accounts. The Trojans can also buy applications on Google Play. Once infected, it is very difficult to get rid of them.

How to Protect My Phone?

Just like your PC, your phone needs antivirus protection as well. The risk of infection is highest for Android, where security software is already available. Make sure all your Android devices are protected by anti-malware software.

Experts are constantly warning that malware risk is real and growing. They believe that the number of threats will double in 2017 because hackers are developing smarter ways to bypass Android protection mechanisms.

While mobility is taking over don’t let mobile malware do the same! Protect your phone by install Zemana Mobile Antivirus, a lightweight antivirus app that will give you peace of mind, knowing that you are protected.

It will keep you safe from ransomware, spyware, viruses, key-loggers and zero-day malware. Zemana Mobile Antivirus is an AV-Certified Antivirus Protection. It has the fastest scanner on the market, which will allow you to detect and easily remove infections.

Keep you Android device virus free!

Download your security app here.

Arm your Android device with an anti-keylogger

 
Checking your Android device, from time to time, for a secret keylogger that is able to record whatever you do, will certainly not harm you. But doing nothing and letting an app do everything for you sounds even better. Did you ever hear about android anti-keylogger? 
 
Secret spy in your device
 
Having your data stolen is definitely not your dream scenario. If we go back in the near past, we can localize few keylogger attacks on Android devices that made the security alerts for Android users go high up! 
 
The scene with Flash Keyboard was definitely among them. The app was actually among the most popular apps on Google Play Store if we look at the download rate, until cyber security companies revealed that the app was stealing users’ data without their permission and then sending the info (GPS location, email address and etc.) to various servers located in China, United States and the Netherlands. Once found out Google removed the app from the store. 
Another keylogger attack scenario happened with the perfect legitimate Android Keyboard application – SwiftKey that was infected with a Trojan that turned the app into a keylogger.

 

Anti-keylogger – let’s keep private as private
Having in mind the above scenarios, which are not the only examples of keylogging attacks, and the fact that more and more advanced versions of keyloggers are coming to the surface – a security shield is highly needed.
Anti-keylogger feature for Android devices keeps your private data as private and besides a usual malware scanner and real-time protection that most of the security apps have, the anti-keylogger is an additional layer of protection which is specifically designed to detect and block the keylogger that may be lurking around in your device.
It detects malicious keyboard applications, password managers and SMS applications that track everything you type, even legitimate keyboard applications which are modified by hackers.
Wolf in sheep’s clothing
Downloading a security app is the first step in securing your device but what is even more important is the human factor which in many cases leads to these attacks. Advanced version of keyloggers have the ability to trick users worldwide, like a wolf in sheep’s clothing, in order to get what they want. Simply by putting a nice mask, something that we are familiar with, they are covering their real malicious face. It is always good to download an app from reliable sources and to always review what is the app asking us to do. By simply clicking next, next, next and agree can lead to many unwanted situations.
Scan the below code to download the app:

Zemana Mobile Antivirus protects you from malicious SMS applications

Developers of Zemana Mobile Antivirus made certain improvements on the anti-keylogger feature. Now, the app protects you from malicious SMS applications.

What are malicious SMS applications?

Nowadays, almost all Android devices are vulnerable to any kind of attack that could allow hackers to access the vulnerable device without the owners being aware of it.

Malicious SMS applications look like a totally legitimate SMS application but it actually works on a spying manner. The attacker can easily install the malicious app directly into your device whereby they get your consent to monitor your messages. Once the software is installed into your device to be monitored, it logs activity such as SMS messages.

These malicious SMS applications are able to retrieve users’ new text messages but it will also extract old and deleted text messages as well. It does this by scouring the memory of the mobile device and extracting all available old and deleted text messages that haven’t been overwritten.

 

Image: Zemana Mobile Antivirus detected SMS malware

Trust what you type in your short messages

With the ever accelerating presence of malicious SMS, developers of Zemana Mobile Antivirus decided to improve its anti-keylogger protection feature and to enhance it with a special layer of protection from, above mentioned malicious SMS applications.

Stay safe and install Zemana Mobile Antivirus.

New Android malware has the ability to steal your credentials

Security researchers from Kaspersky Lab discovered a new piece of Android malware designed to steal your banking credentials and even pretend it’s your bank in a sophisticated way.

All in all, the malware in the basic terms is similar to other variants. However, it stands out with its ability to intercept and delete sent messages from banking institutions.

This can create a massive impact on online banking users since even if the bank notifies them about the new malicious banking activity, the new malware can delete or customize the message leaving the users unaware that they may soon become a victim and loose a bunch of money.

Some banks practice sending alerts via SMS to users in order to authenticate some unusual banking activity on their accounts.

In Russia, it’s the worst case since the malware can offset any mobile security solution that is popular in Russia and installed on your phone in order to finalize the infection path.

You can download the malware from anywhere without being aware of it

It hides everywhere and it can be downloaded via Google AdSense advertising network, which means – Watch Out! Lot of sites, new, old, good and bad use this network to display advertising and the Trojan hides right there.

The Trojan is downloaded as soon as a page with the advert is visited

Android users are always a target due to the openness of the system. However, it came to a point where Android users can’t even Google around and look out for some great sites or great news because the malware is in there aaaand Voila – you have downloaded last-browser-update.apk, a banking Trojan detected by Kaspersky Lab solutions as Trojan-Banker.AndroidOS.Svpeng.q.

The scary part-you don’t even notice that you have downloaded it since it doesn’t require any kind of following confirmation or link clicks.

Even though till now the effects are seen in Russia only, it doesn’t assure us that it will not spread to other countries as well.

Download an Android anti-keylogger and stay worry free. Nothing can bypass that!