Threat actors began to execute attacks on the infected device using overlays to phish data and two-factor authentication (2FA) tokens from victims. Tactics evolved further with automated transaction scripts that run all actions on the infected device and “drive” the legitimate mobile banking application to enter and approve transactions.
In this whitepaper, Intel 471 & Threat Fabric discuss :
Download the whitepaper to learn about the products and services associated with mobile malware attacks.