{"id":245,"date":"2022-06-22T15:22:03","date_gmt":"2022-06-22T15:22:03","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=245"},"modified":"2022-06-22T15:22:03","modified_gmt":"2022-06-22T15:22:03","slug":"malware-android-puo-rubare-dati-finanziari","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/it\/malware-102\/malware-android-puo-rubare-dati-finanziari\/","title":{"rendered":"Un malware Android pu\u00f2 rubare dati finanziari"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Tre anni fa, il numero di infezioni da malware era aumentato e nuovi malware erano stati scoperti. Questo malware poteva rubare dati finanziari bypassando l'autenticazione a pi\u00f9 fattori. I ricercatori di F5 Labs hanno rilevato il virus, che hanno soprannominato \u201cExobot\u201d. Si ritiene che il virus si sia diffuso tramite siti web fraudolenti e email di spam. Exobot invita gli utenti a scaricarlo, pensando che sia un popolare tracker di criptovalute.\u00a0<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Dettagli del malware MaliBot per Android.<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">I ricercatori di F-Secure hanno scoperto per primi il malware Exobot. Il malware \u00e8 un malware sofisticato che pu\u00f2 bypassare l'autenticazione a due fattori e rubare dati finanziari. Il malware viene distribuito tramite siti web fraudolenti e smishing. Una volta installato, il malware richiede autorizzazioni per sovrapporre altre app e accedere a messaggi SMS, elenchi di contatti e registri delle chiamate. Con queste autorizzazioni, il malware pu\u00f2 intercettare i codici monouso (OTP) inviati tramite SMS per le app bancarie e bypassare l'autenticazione a due fattori.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Exobot pu\u00f2 anche registrare le chiamate telefoniche al servizio clienti per ottenere ulteriori credenziali di accesso o altre informazioni sensibili. Se pensi di aver scaricato il malware Exobot, \u00e8 importante disinstallare qualsiasi app sospetta e cambiare immediatamente le tue password. Dovresti anche abilitare l'autenticazione a due fattori su tutti gli account che la supportano. E infine, assicurati di scaricare app solo da fonti affidabili come il Google Play Store.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Il malware MaliBot per Android bypassa l'autenticazione a due fattori.<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Una volta installato, il malware richiede autorizzazioni che sono solitamente considerate sospette, come l'accesso ai messaggi SMS, agli elenchi di contatti e ai registri delle chiamate. Richiede anche il permesso di sovrapporre altre app. Con queste autorizzazioni, il malware pu\u00f2 intercettare i codici monouso (OTP) inviati tramite SMS per le app bancarie e bypassare l'autenticazione a due fattori. L'app pu\u00f2 anche registrare le chiamate telefoniche effettuate al servizio clienti per ottenere ulteriori credenziali di accesso o altre informazioni sensibili.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">\u201cQuesto \u00e8 un pezzo molto sofisticato di malware Android\u201d, ha detto Craig Young, un ricercatore principale sulla sicurezza del team di ricerca sulle vulnerabilit\u00e0 e esposizioni (VERT) di Tripwire. \u201cGli sviluppatori hanno lavorato molto per renderlo difficile da rilevare e analizzare.\u201d<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Cos'\u00e8 l'autenticazione a due fattori?<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">L'autenticazione a due fattori, comunemente nota come verifica in due passaggi, \u00e8 un tipo di verifica dell'identit\u00e0 che utilizza due elementi: una password e un codice monouso inviato tramite messaggio di testo. Anche se gli aggressori hanno accesso alla tua password, avranno bisogno dell'accesso al tuo telefono per accedere perch\u00e9 avranno anche bisogno dell'accesso al luogo in cui ricevi il codice monouso.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Come abilitare l'autenticazione a due fattori?<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">L'autenticazione a due fattori \u00e8 un ulteriore livello di sicurezza che pu\u00f2 proteggere i tuoi account online dall'essere hackerati. Se non stai gi\u00e0 utilizzando l'autenticazione a due fattori, \u00e8 fondamentale abilitarla su tutti gli account che la supportano. Per abilitare l'autenticazione a due fattori, devi accedere al tuo account e andare alle impostazioni di sicurezza. Da l\u00ec, dovrai generare un codice monouso inviato tramite SMS o un'app. Una volta ottenuto il codice, lo inserirai quando richiesto per accedere. \u00c8 importante notare che dovresti utilizzare solo app da fonti affidabili come il Google Play Store quando generi codici monouso.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">In conclusione<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Il malware Exobot \u00e8 un malware Android sofisticato che pu\u00f2 bypassare l'autenticazione a due fattori e rubare dati finanziari. Se pensi di aver scaricato il malware Exobot, \u00e8 importante disinstallare qualsiasi app sospetta e cambiare immediatamente le tue password. Dovresti anche abilitare l'autenticazione a due fattori su tutti gli account che la supportano. E infine, assicurati di scaricare app solo da fonti affidabili come il Google Play Store.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Tre anni fa, il numero di infezioni da malware era aumentato e ne erano state scoperte di nuove. Questo malware poteva rubare dati finanziari aggirando l'autenticazione a pi\u00f9 fattori. I ricercatori di F5 Labs... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/it\/malware-102\/malware-android-puo-rubare-dati-finanziari\/\">Continue reading <span class=\"screen-reader-text\">Un malware Android pu\u00f2 rubare dati finanziari<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":246,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-245","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Android Malware Can Steal Financial Data | Security Briefing<\/title>\n<meta name=\"description\" content=\"How to protect yourself from android malware that steals financial data and can bypass multi-factor authentication.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/it\/malware-102\/malware-android-puo-rubare-dati-finanziari\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Android Malware Can Steal Financial Data | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"How to protect yourself from android malware that steals financial data and can bypass multi-factor authentication.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/it\/malware-102\/malware-android-puo-rubare-dati-finanziari\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-22T15:22:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"719\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Android Malware Can Steal Financial Data\",\"datePublished\":\"2022-06-22T15:22:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/\"},\"wordCount\":585,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg\",\"articleSection\":[\"Malware\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/\",\"url\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/\",\"name\":\"Android Malware Can Steal Financial Data | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg\",\"datePublished\":\"2022-06-22T15:22:03+00:00\",\"description\":\"How to protect yourself from android malware that steals financial data and can bypass multi-factor authentication.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg\",\"width\":1000,\"height\":719,\"caption\":\"android-malware-can-steal-financial-data\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Android Malware Can Steal Financial Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/it\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malware Android pu\u00f2 rubare dati finanziari | Briefing sulla sicurezza.","description":"Come proteggersi dal malware Android che ruba dati finanziari e pu\u00f2 bypassare l'autenticazione multifattoriale.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/it\/malware-102\/malware-android-puo-rubare-dati-finanziari\/","og_locale":"it_IT","og_type":"article","og_title":"Android Malware Can Steal Financial Data | Security Briefing","og_description":"How to protect yourself from android malware that steals financial data and can bypass multi-factor authentication.","og_url":"https:\/\/securitybriefing.net\/it\/malware-102\/malware-android-puo-rubare-dati-finanziari\/","og_site_name":"Security Briefing","article_published_time":"2022-06-22T15:22:03+00:00","og_image":[{"width":1000,"height":719,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"security","Tempo di lettura stimato":"3 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Android Malware Can Steal Financial Data","datePublished":"2022-06-22T15:22:03+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/"},"wordCount":585,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg","articleSection":["Malware"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/","url":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/","name":"Malware Android pu\u00f2 rubare dati finanziari | Briefing sulla sicurezza.","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg","datePublished":"2022-06-22T15:22:03+00:00","description":"Come proteggersi dal malware Android che ruba dati finanziari e pu\u00f2 bypassare l'autenticazione multifattoriale.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg","width":1000,"height":719,"caption":"android-malware-can-steal-financial-data"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Android Malware Can Steal Financial Data"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Briefing sulla sicurezza","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Briefing sulla sicurezza","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"sicurezza","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin \u00e8 una redattrice senior per Government Technology. In precedenza ha scritto per PYMNTS e The Bay State Banner e ha conseguito una laurea in scrittura creativa alla Carnegie Mellon. Risiede fuori Boston.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/it\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/posts\/245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/comments?post=245"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/posts\/245\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/media\/246"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/media?parent=245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/categories?post=245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/tags?post=245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}