Close Menu
InfoQuest Network
  • News
  • World
    • United States
    • Canada
    • Europe
    • Asia
    • Latin America
    • Australia
    • Africa
  • Politics
  • Business
    • Personal Finance
    • Finance
    • Markets
    • Startup
    • Investing
    • Innovation
    • Billionaires
    • Crypto
  • Tech
  • Lifestyle
  • Sports
  • Travel
  • More
    • Science
    • Entertainment
    • Health & Wellness
    • Immigration
Trending

Unbelievable Robot Vacuum: Features Impressive Arms and Navigation – Now $400 Off for Prime Day!

July 7, 2025

Denmark Cautions That Trump’s Greenland Threat Is Still Not Resolved

July 7, 2025

E-biker Accused of Reckless Riding and Assaulting Officer

July 7, 2025
Facebook X (Twitter) Instagram
Smiley face Weather     Live Markets
  • Newsletter
  • Advertise
Facebook X (Twitter) Instagram YouTube
InfoQuest Network
  • News
  • World
    • United States
    • Canada
    • Europe
    • Asia
    • Latin America
    • Australia
    • Africa
  • Politics
  • Business
    • Personal Finance
    • Finance
    • Markets
    • Startup
    • Investing
    • Innovation
    • Billionaires
    • Crypto
  • Tech
  • Lifestyle
  • Sports
  • Travel
  • More
    • Science
    • Entertainment
    • Health & Wellness
    • Immigration
InfoQuest Network
  • News
  • World
  • Politics
  • Business
  • Finance
  • Entertainment
  • Health & Wellness
  • Lifestyle
  • Technology
  • Travel
  • Sports
  • Personal Finance
  • Billionaires
  • Crypto
  • Innovation
  • Investing
  • Markets
  • Startup
  • Immigration
  • Science
Home»Business»Innovation»Caution for Users of Android 13 or Newer as Dangerous New Threat Appears
Innovation

Caution for Users of Android 13 or Newer as Dangerous New Threat Appears

News RoomBy News RoomAugust 5, 20240 ViewsNo Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Reddit Telegram WhatsApp

A new Android banking trojan named BlankBot has been discovered by threat intelligence experts, capable of stealing SMS text messages, banking information, and device lock patterns or PINs. What sets BlankBot apart is its invisibility to most antivirus software, making it difficult to detect and remove from infected devices. Initially targeting Turkish users, BlankBot is still under active development and has a range of malicious capabilities including customer injections, keylogging, and screen recording. The trojan communicates with a control server over a WebSocket connection, allowing attackers to remotely access and control infected devices.

BlankBot primarily targets users of Android 13 and newer devices and is distributed as various utility applications for Android users. The trojan remains undetected by most antivirus programs and relies on users enabling Android accessibility services to gain complete control over the infected device. Once installed, the app prompts users to grant the required permissions under the guise of an app update, while running in the background and connecting to a malicious control server. BlankBot checks for the operating system version being used and implements a session-based package installer to bypass restricted settings for newer Android versions. The trojan can prevent users from accessing settings and maintain persistence on infected devices.

To mitigate the risk of BlankBot infection, users are advised to only download apps from official app stores and avoid side-loading applications from unknown sources. It is important to pay attention to the permissions requested by an app, especially accessibility permissions that grant complete control over the device. By understanding why an app requires certain permissions and opting for alternatives from official sources, users can minimize the risk of falling victim to malware attacks. Google Play Protect automatically detects and blocks known versions of this malware, providing an additional layer of security for Android users. The protection is enabled by default on Android devices with Google Play Services, offering warnings and blocking malicious apps even from external sources.

Kangen Water

In a statement provided by a Google spokesperson, it was confirmed that no apps containing BlankBot malware have been found on Google Play. Android users are protected against known versions of the malware by Google Play Protect, which actively scans apps for malicious content and warns users about potential threats. Despite the presence of BlankBot, Android users can rely on Google’s security measures to prevent infections and maintain the safety of their devices. It is essential for users to stay vigilant, exercise caution while downloading apps, and follow recommended security practices to protect themselves from evolving threats like BlankBot.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Reddit Telegram WhatsApp

Related News

Using this AI Model Could Spare Thousands of Cancer Patients from Receiving Unnecessary Treatments

November 5, 2024

Saudi Plans to Utilize Oil Wealth to Establish Itself as a Major Player in Artificial Intelligence

November 5, 2024

John Jumper of Google DeepMind Reflects on Nobel Prize Win and AlphaFold’s Future

November 5, 2024

Facebook Earned Over $1 Million from Ads Promoting Election Misinformation

November 5, 2024

Elon Musk’s “United States of America Inc” Sends Payments to Pro-Trump PAC Backers

November 4, 2024

Amazon is making a major investment in small nuclear reactors to power its data centers

October 25, 2024
Add A Comment
Leave A Reply Cancel Reply

Top News

Denmark Cautions That Trump’s Greenland Threat Is Still Not Resolved

July 7, 2025

E-biker Accused of Reckless Riding and Assaulting Officer

July 7, 2025

Youth Dies in ATV Crash in Southwestern Ontario, Police Report

July 7, 2025

Subscribe to Updates

Get the latest news and updates directly to your inbox.

Advertisement
Kangen Water
InfoQuest Network
Facebook X (Twitter) Instagram YouTube
  • Home
  • Privacy Policy
  • Terms of use
  • Press Release
  • Advertise
  • Contact
© 2025 Info Quest Network. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.