Security News > 2022 > June > FluBot takedown: Law enforcement takes control of Android spyware’s infrastructure
An international law enforcement operation involving 11 countries has disrupted the spreading of the FluBot Android malware, which spreads via SMS and MMS and steals sensitive information - passwords, online banking details, etc.
The Dutch Police, who took control of the malware's infrastructure earlier in May, made the malware inactive.
"Victims often do not know that they have installed the malware. The further spread of the malware also happens without the user of a mobile phone noticing. As FluBot spreads further by using contact lists in a phone, the malicious software spreads like wildfire," the Polities added.
FluBot can only infect Android smartphones, but the crooks behind this malware have also been known to target iPhone users, as well - just not with malware.
The operation aimed at disrupting FluBot infrastructure involved law enforcement agencies from Australia, a bevy of European countries, and the US, and was coordinated and aided by Europol.
Only Android users can be infected with FluBot, but clicking on the link in the SMS message does not start the installation of the malware.
News URL
https://www.helpnetsecurity.com/2022/06/01/flubot-takedown/
Related news
- New Android spyware found on phone seized by Russian FSB (source)
- New EagleMsgSpy Android spyware used by Chinese police, researchers say (source)
- Gamaredon Deploys Android Spyware "BoneSpy" and "PlainGnome" in Former Soviet States (source)
- Russian cyberspies target Android users with new spyware (source)
- Russian cyberspies target Android users with new spyware (source)
- New Android NoviSpy spyware linked to Qualcomm zero-day bugs (source)