If you install this fake version of Chrome, it’s the end of your Android!

If you install this fake version of Chrome, it’s the end of your Android!
If you install this fake version of Chrome, it’s the end of your Android!
-

It is not easy to escape all the threats that are present on the Internet. Because many times, especially when we use our smartphones, we do so in leisure mode. This way it’s easy to end up loading where you shouldn’t. Especially when it’s something flashy like a version of Chrome that will fix a big problem. But you really have to be careful. At least as much as you can. If you install a certain fake version of Chrome, it means the end of your Android smartphone being under the control of other people.

If you install this fake version of Chrome, it’s the end of your Android!

Security researchers have discovered a new Android threat they call Brokewell that can capture every event on the device, from taps and displayed information to text input and apps users launch.

The malware is distributed through a fake Google Chrome update that is displayed when using the browser. Brokewell is therefore under active development and features a mix of extensive device acquisition and remote control capabilities.

Source: Bleepingcomputer.com

Meanwhile, researchers from the company ThreatFabric discovered Brokewell after investigating a fake Chrome update page that dropped a payload, a common method of tricking unsuspecting users into installing malware.

Brokewell’s main capabilities are to steal data and offer remote control to attackers.

The most serious things this threat can do! Believe me it’s scary!

Data theft

  • Mimics the login screens of targeted applications to steal credentials (overlay attacks).
  • It uses its own WebView to intercept and extract cookies after users connect to a legitimate website.
  • Captures the victim’s interaction with the device, including taps, swipes, and text inputs, to steal sensitive data presented or entered on the device.
  • Collects hardware and software details about the device.
  • Retrieves call logs.
  • Determines the physical location of the device.
  • Captures audio using the device’s microphone.

Device Purchase

  • Allows the attacker to see the device’s screen in real time (screencast).
  • Remotely perform tap and swipe gestures on the infected device.
  • Allows you to remotely click on specific elements or coordinates on the screen.
  • Allows remote scrolling within elements and typing text into specified fields.
  • Simulates pressing physical buttons such as Back, Home and Recents.
  • Activates the device’s screen remotely to make any information available for capture.
  • Adjust settings like brightness and volume down to zero.

However, to protect yourself from this, avoid downloading applications or application updates outside of Google Play and make sure Play Protect is always active on your device.

The article is in Portuguese

Tags: install fake version Chrome Android

-

-

NEXT 3 essential Smart devices to add to your gift list and celebrate their day