Android spyware strikes again targeting financial institutions and your money

A new version of the Android malware known as SpyNote is now attacking financial institutions around the world, which is a matter of concern. The malware combines spyware with the characteristics of banking Trojans and has targeted well-known banks, including HSBC.

Click for KURT’s online newsletter with quick tips, tech reviews, security alerts, and how-tos to make you smarter.

Hackers are increasingly using SpyNote malware to covertly monitor and modify Android smartphones. As a result, cybersecurity experts are warning and urging Android owners to be careful, especially while installing new apps.

What’s just new is your new phone?

Malware allows hackers to target financial institutions through Android phones.
(Fox News)

What does SpyNote do?

SpyNote, also known as SpyMax, is a very dangerous spyware family designed to monitor, manage and modify a device (in this case, Android devices). It can perform various malicious activities, including collecting SMS messages, videos, calls, and audio recordings, tracking GPS locations, stealing passwords and credit card numbers, and much more. The latest type of spyware is called SpyNote.C, and it is the first to openly target organizations and banking applications. It specifically targets banking apps and impersonating apps from several large, reputable financial institutions.

How to create or leave a group text

How does SpyNote deceive Android owners?

SpyNote closely follows the methods of other banking malware by requesting permissions to accessibility services so that it can extract two-factor authentication codes and transmit banking information.

Another method it uses to trick people is by disguising themselves as well-known apps like Facebook, WhatsApp, and Google Play, as well as other generic apps like wallpaper, productivity, and game apps. Distributing malware by disguising it as recognizable applications is a common method used by hackers to deceive victims.

Large boxes may be hidden in your spam folder

Has SpyNote attacked many Android owners?

At least 87 different customers between August 2021 and October 2022 have mistakenly purchased SpyNote since it was announced by its developer under the fictitious name CypherRat through its Telegram channel. However, in October 2022, the source code for CypherRat was announced on IT service management company GitHub. Once the code was released, SpyNote attacks increased significantly and began to focus more on online banking applications.

Overpaying for Netflix?

How do I protect myself from SpyNote?

Experts warn Android owners not to download any suspicious looking apps or apps from unknown sources. You should always check app ratings and star ratings before downloading and refrain from downloading if only a few people are using it. Also, grant the relevant permissions for the purpose of the app only.

However, the best way to protect your device from malware is to install antivirus software. My biggest desire is to educate you and inform you of the real growing threat to each of our connected devices and encourage you to use strong virus security protection on everything in your life that is connected to the rest of the world.

See my expert review of the best antivirus protection for Windows, Mac, Android and iOS by searching for “best antivirus” on by clicking the magnifying glass icon at the top of my website.

Related: Free Antivirus: Should You Use It?

Shut your technology down with informative articles written by Kurt "CyberGuy" Knutson.

Shut Your Technology Down with Informative Articles by Kurt “CyberGuy” Knutson.
(Fox News)

Click here for the FOX NEWS app

For more of my security tips, head over to and be sure to sign up for my free CyberGuy Report newsletter by clicking the “Free Newsletter” link at the top of my website.

Copyright 2023 All rights reserved. articles and content may contain affiliate links that earn commission when purchases are made.

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *