Chrome & Firefox extensions stole millions of data

Chrome & Firefox extensions stole millions of data

A huge leak of data was discovered by security researcher Sam Jidali and his team. Leakage came from 8 ...
Read More

The first Online Mobile Malware Observation for Android from Upstream

Secure-D, the Upstream security platform, the leading Greek technology company, launches the first online Mobile Malware Observatory with ...
Read More

Password Alert: 72% of users are recycling passwords!

Password Alert: Users recycle the same password on average four times, according to a report ....
Read More

Oakland: The third US city forbidding face recognition

Oakland, California, becomes the third US city that has decided to ban face recognition software from ...
Read More

Apps are removed from the Google Play Store due to ads

Google has taken strictest measures against apps in the Play Store, which are trying with insidious methods to abuse their ...
Read More
Latest Posts

The latest threat to Android devices is called WannaHydra

A new malware identified by the company Avast, attempts to infect smartphones in the Brazilian region and steal bank data from users.

The malware, called WannaHydra, has the ability to intercept information, collect call logs, access contacts, and take pictures of a contaminated device.

Until now, malware seems to target mainly customers of Santander, Itaú and Banco do Brasil.

According to Avast, malicious software is likely to spread through bogus websites and third-party apps that affect both Android as well as iOS Appliances.

Once WannaHydra is installed on a smartphone, it notifies the user of an alleged problem with its bank account and asks for the username and password to be resolved.

In order to be more reliable, malware displays a page that mimics the bank's official page, which increases the likelihood that the user will be fooled and give their data.

Still, WannaHydra may display a copy of the WannaLocker virus in Portuguese. This is a ransomware which appeared in June of 2017 around the same time as WannaCry.

Nikolaos Chrysaidos, a security researcher at Avast, said in a press release that this was the first time the company detected a virus that is at the same time banking Trojan and ransomware.

The best way to protect yourself from such incidents is to use an antivirus application and avoid downloading apps from unofficial sites and stores. In addition, it is very important to keep your data back up. Here are six simple steps to protect you from WannaHydra:

  1. Be always cautious: Banking applications never ask customers for login because of alleged accounting irregularities. Generally, such contacts are made by phone and the customer is invited to appear at one of the bank's branches. So, if such a message appears on your device, ignore it.
  2. Use antivirus and firewall programs: It's very important to use trusted applications to block malware, viruses and other malware, especially on Android devices, as they are more vulnerable.
  3. Do not click on suspicious links: Avoid clicking any link you are sent through E-mail which is supposed to come from your bank or from other sources or websites.
  4. Enable Google Play Protect: If you are an Android user, open the application Google Play Store, tap on Μενού (the three parallel bars), select Play Protect and check your native Android defense status.
  5. Avoid installing applications manually or through third-party stores: Third-party stores can spread dangerous content, so it's best not to install apps from them.
  6. Make regular backups of your data: Backups will save your data if your device becomes a victim of a ransomware attack. All you have to do is restore your factory settings, reset your device and transfer your data.
Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (, as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *