{"id":245,"date":"2022-06-22T15:22:03","date_gmt":"2022-06-22T15:22:03","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=245"},"modified":"2022-06-22T15:22:03","modified_gmt":"2022-06-22T15:22:03","slug":"%ec%95%88%eb%93%9c%eb%a1%9c%ec%9d%b4%eb%93%9c-%ec%95%85%ec%84%b1%ec%bd%94%eb%93%9c%ea%b0%80-%ea%b8%88%ec%9c%b5-%eb%8d%b0%ec%9d%b4%ed%84%b0%eb%a5%bc-%ed%9b%94%ec%b9%a0-%ec%88%98-%ec%9e%88%ec%9d%8c","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ko\/%eb%a9%80%ec%9b%a8%ec%96%b4-102\/%ec%95%88%eb%93%9c%eb%a1%9c%ec%9d%b4%eb%93%9c-%ec%95%85%ec%84%b1%ec%bd%94%eb%93%9c%ea%b0%80-%ea%b8%88%ec%9c%b5-%eb%8d%b0%ec%9d%b4%ed%84%b0%eb%a5%bc-%ed%9b%94%ec%b9%a0-%ec%88%98-%ec%9e%88%ec%9d%8c\/","title":{"rendered":"\uae08\uc735 \ub370\uc774\ud130\ub97c \ud0c8\ucde8\ud558\ub294 \uc548\ub4dc\ub85c\uc774\ub4dc \uba40\uc6e8\uc5b4"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Three years ago, the number of malware infections had increased, and new malware had been discovered. This malware could steal financial data by bypassing multi-factor authentication. Researchers at F5 Labs detected the virus, which they dubbed \u201cExobot.\u201d It\u2019s believed the virus have spread via fraudulent websites and spam email. Exobot invite users to download it, thinking it\u2019s a popular cryptocurrency tracker.\u00a0<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">MaliBot \uc548\ub4dc\ub85c\uc774\ub4dc \uc545\uc131\ucf54\ub4dc\uc758 \uc138\ubd80\uc0ac\ud56d.<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">F-Secure\uc758 \uc5f0\uad6c\uc6d0\ub4e4\uc774 \ucc98\uc74c\uc73c\ub85c Exobot \uc545\uc131\ucf54\ub4dc\ub97c \ubc1c\uacac\ud588\uc2b5\ub2c8\ub2e4. \uc774 \uc545\uc131\ucf54\ub4dc\ub294 \uc774\uc911 \uc778\uc99d\uc744 \uc6b0\ud68c\ud558\uace0 \uae08\uc735 \ub370\uc774\ud130\ub97c \ud0c8\ucde8\ud560 \uc218 \uc788\ub294 \uc815\uad50\ud55c \uc545\uc131\ucf54\ub4dc\uc785\ub2c8\ub2e4. \uc545\uc131\ucf54\ub4dc\ub294 \uc0ac\uae30 \uc6f9\uc0ac\uc774\ud2b8\uc640 \uc2a4\ubbf8\uc2f1\uc744 \ud1b5\ud574 \ubc30\ud3ec\ub429\ub2c8\ub2e4. \uc124\uce58\ub418\uba74, \uc545\uc131\ucf54\ub4dc\ub294 \ub2e4\ub978 \uc571\uc744 \uc624\ubc84\ub808\uc774\ud558\uace0 SMS \uba54\uc2dc\uc9c0, \uc5f0\ub77d\ucc98 \ubaa9\ub85d, \ud1b5\ud654 \uae30\ub85d\uc5d0 \uc811\uadfc\ud560 \uc218 \uc788\ub294 \uad8c\ud55c\uc744 \uc694\uccad\ud569\ub2c8\ub2e4. \uc774\ub7ec\ud55c \uad8c\ud55c\uc744 \ud1b5\ud574 \uc545\uc131\ucf54\ub4dc\ub294 \uc740\ud589 \uc571\uc744 \uc704\ud55c SMS\ub85c \uc804\uc1a1\ub41c \uc77c\ud68c\uc131 \ube44\ubc00\ubc88\ud638(OTP)\ub97c \uac00\ub85c\ucc44\uace0 \uc774\uc911 \uc778\uc99d\uc744 \uc6b0\ud68c\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Exobot\uc740 \ub610\ud55c \uace0\uac1d \uc11c\ube44\uc2a4\uc5d0 \uac78\ub824\uc628 \uc804\ud654\ub97c \ub179\uc74c\ud558\uc5ec \ucd94\uac00\uc801\uc778 \ub85c\uadf8\uc778 \uc790\uaca9 \uc99d\uba85\uc774\ub098 \uae30\ud0c0 \ubbfc\uac10\ud55c \uc815\ubcf4\ub97c \uc5bb\uc744 \uc218 \uc788\uc2b5\ub2c8\ub2e4. Exobot \uc545\uc131\ucf54\ub4dc\ub97c \ub2e4\uc6b4\ub85c\ub4dc\ud588\ub2e4\uace0 \uc0dd\uac01\ub418\uba74, \uc758\uc2ec\uc2a4\ub7ec\uc6b4 \uc571\uc744 \uc989\uc2dc \uc81c\uac70\ud558\uace0 \ube44\ubc00\ubc88\ud638\ub97c \ubcc0\uacbd\ud558\ub294 \uac83\uc774 \uc911\uc694\ud569\ub2c8\ub2e4. \ub610\ud55c, \uc9c0\uc6d0\ub418\ub294 \ubaa8\ub4e0 \uacc4\uc815\uc5d0 \uc774\uc911 \uc778\uc99d\uc744 \ud65c\uc131\ud654\ud574\uc57c \ud569\ub2c8\ub2e4. \ub9c8\uc9c0\ub9c9\uc73c\ub85c, Google Play \uc2a4\ud1a0\uc5b4\uc640 \uac19\uc740 \uc2e0\ub8b0\ud560 \uc218 \uc788\ub294 \ucd9c\ucc98\uc5d0\uc11c\ub9cc \uc571\uc744 \ub2e4\uc6b4\ub85c\ub4dc\ud574\uc57c \ud569\ub2c8\ub2e4.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">MaliBot \uc548\ub4dc\ub85c\uc774\ub4dc \uc545\uc131\ucf54\ub4dc\ub294 \uc774\uc911 \uc778\uc99d\uc744 \uc6b0\ud68c\ud569\ub2c8\ub2e4.<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">\uc124\uce58\ub418\uba74, \uc545\uc131\ucf54\ub4dc\ub294 SMS \uba54\uc2dc\uc9c0, \uc5f0\ub77d\ucc98 \ubaa9\ub85d, \ud1b5\ud654 \uae30\ub85d\uc5d0 \uc811\uadfc\ud560 \uc218 \uc788\ub294 \uad8c\ud55c\uacfc \uac19\uc740 \uc77c\ubc18\uc801\uc73c\ub85c \uc758\uc2ec\uc2a4\ub7ec\uc6b4 \uad8c\ud55c\uc744 \uc694\uccad\ud569\ub2c8\ub2e4. \ub610\ud55c \ub2e4\ub978 \uc571\uc744 \uc624\ubc84\ub808\uc774\ud560 \uc218 \uc788\ub294 \uad8c\ud55c\ub3c4 \uc694\uccad\ud569\ub2c8\ub2e4. \uc774\ub7ec\ud55c \uad8c\ud55c\uc744 \ud1b5\ud574 \uc545\uc131\ucf54\ub4dc\ub294 \uc740\ud589 \uc571\uc744 \uc704\ud55c SMS\ub85c \uc804\uc1a1\ub41c \uc77c\ud68c\uc131 \ube44\ubc00\ubc88\ud638(OTP)\ub97c \uac00\ub85c\ucc44\uace0 \uc774\uc911 \uc778\uc99d\uc744 \uc6b0\ud68c\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc571\uc740 \ub610\ud55c \uace0\uac1d \uc11c\ube44\uc2a4\uc5d0 \uac78\ub824\uc628 \uc804\ud654\ub97c \ub179\uc74c\ud558\uc5ec \ucd94\uac00\uc801\uc778 \ub85c\uadf8\uc778 \uc790\uaca9 \uc99d\uba85\uc774\ub098 \uae30\ud0c0 \ubbfc\uac10\ud55c \uc815\ubcf4\ub97c \uc5bb\uc744 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">\u201cThis is a very sophisticated piece of Android malware,\u201d said Craig Young, a principal security researcher at Tripwire\u2019s Vulnerability and Exposure Research Team (VERT). \u201cThe developers have put a lot of work into making it difficult to detect and analyze.\u201d<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">\uc774\uc911 \uc778\uc99d\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694?<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Two-factor authentication, commonly known as two-step verification, is a type of identity verification that uses two elements: a password and a one-time code sent to you by text message. Even if the attackers have access to your password, they\u2019ll need access to your phone to log in because they\u2019ll also need access to the location where you\u2019re receiving the one-time code.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">\uc774\uc911 \uc778\uc99d\uc744 \uc5b4\ub5bb\uac8c \ud65c\uc131\ud654\ud558\ub098\uc694?<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">\uc774\uc911 \uc778\uc99d\uc740 \uc628\ub77c\uc778 \uacc4\uc815\uc774 \ud574\ud0b9\ub418\ub294 \uac83\uc744 \ubc29\uc9c0\ud560 \uc218 \uc788\ub294 \ucd94\uac00\uc801\uc778 \ubcf4\uc548 \uacc4\uce35\uc785\ub2c8\ub2e4. \uc774\ubbf8 \uc774\uc911 \uc778\uc99d\uc744 \uc0ac\uc6a9\ud558\uace0 \uc788\uc9c0 \uc54a\ub2e4\uba74, \uc9c0\uc6d0\ub418\ub294 \ubaa8\ub4e0 \uacc4\uc815\uc5d0 \uc774\ub97c \ud65c\uc131\ud654\ud558\ub294 \uac83\uc774 \uc911\uc694\ud569\ub2c8\ub2e4. \uc774\uc911 \uc778\uc99d\uc744 \ud65c\uc131\ud654\ud558\ub824\uba74, \uacc4\uc815\uc5d0 \ub85c\uadf8\uc778\ud558\uc5ec \ubcf4\uc548 \uc124\uc815\uc73c\ub85c \uc774\ub3d9\ud574\uc57c \ud569\ub2c8\ub2e4. \uadf8\uacf3\uc5d0\uc11c SMS \ub610\ub294 \uc571\uc744 \ud1b5\ud574 \uc804\uc1a1\ub41c \uc77c\ud68c\uc131 \ucf54\ub4dc\ub97c \uc0dd\uc131\ud574\uc57c \ud569\ub2c8\ub2e4. \ucf54\ub4dc\ub97c \ubc1b\uc73c\uba74, \ub85c\uadf8\uc778 \uc2dc \uc694\uccad\ub420 \ub54c \uc785\ub825\ud574\uc57c \ud569\ub2c8\ub2e4. \uc77c\ud68c\uc131 \ucf54\ub4dc\ub97c \uc0dd\uc131\ud560 \ub54c\ub294 Google Play \uc2a4\ud1a0\uc5b4\uc640 \uac19\uc740 \uc2e0\ub8b0\ud560 \uc218 \uc788\ub294 \ucd9c\ucc98\uc758 \uc571\ub9cc \uc0ac\uc6a9\ud574\uc57c \ud55c\ub2e4\ub294 \uc810\uc744 \uc720\uc758\ud574\uc57c \ud569\ub2c8\ub2e4.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">\uacb0\ub860<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Exobot \uc545\uc131\ucf54\ub4dc\ub294 \uc774\uc911 \uc778\uc99d\uc744 \uc6b0\ud68c\ud558\uace0 \uae08\uc735 \ub370\uc774\ud130\ub97c \ud0c8\ucde8\ud560 \uc218 \uc788\ub294 \uc815\uad50\ud55c \uc548\ub4dc\ub85c\uc774\ub4dc \uc545\uc131\ucf54\ub4dc\uc785\ub2c8\ub2e4. Exobot \uc545\uc131\ucf54\ub4dc\ub97c \ub2e4\uc6b4\ub85c\ub4dc\ud588\ub2e4\uace0 \uc0dd\uac01\ub418\uba74, \uc758\uc2ec\uc2a4\ub7ec\uc6b4 \uc571\uc744 \uc989\uc2dc \uc81c\uac70\ud558\uace0 \ube44\ubc00\ubc88\ud638\ub97c \ubcc0\uacbd\ud558\ub294 \uac83\uc774 \uc911\uc694\ud569\ub2c8\ub2e4. \ub610\ud55c, \uc9c0\uc6d0\ub418\ub294 \ubaa8\ub4e0 \uacc4\uc815\uc5d0 \uc774\uc911 \uc778\uc99d\uc744 \ud65c\uc131\ud654\ud574\uc57c \ud569\ub2c8\ub2e4. \ub9c8\uc9c0\ub9c9\uc73c\ub85c, Google Play \uc2a4\ud1a0\uc5b4\uc640 \uac19\uc740 \uc2e0\ub8b0\ud560 \uc218 \uc788\ub294 \ucd9c\ucc98\uc5d0\uc11c\ub9cc \uc571\uc744 \ub2e4\uc6b4\ub85c\ub4dc\ud574\uc57c \ud569\ub2c8\ub2e4.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>3\ub144 \uc804, \uba40\uc6e8\uc5b4 \uac10\uc5fc \uac74\uc218\uac00 \uc99d\uac00\ud558\uace0 \uc0c8\ub85c\uc6b4 \uba40\uc6e8\uc5b4\uac00 \ubc1c\uacac\ub418\uc5c8\uc2b5\ub2c8\ub2e4. \uc774 \uba40\uc6e8\uc5b4\ub294 \uba40\ud2f0\ud329\ud130 \uc778\uc99d\uc744 \uc6b0\ud68c\ud558\uc5ec \uae08\uc735 \ub370\uc774\ud130\ub97c \ud6d4\uce60 \uc218 \uc788\uc5c8\uc2b5\ub2c8\ub2e4. F5 Labs\uc758 \uc5f0\uad6c\uc6d0\ub4e4\uc740... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ko\/%eb%a9%80%ec%9b%a8%ec%96%b4-102\/%ec%95%88%eb%93%9c%eb%a1%9c%ec%9d%b4%eb%93%9c-%ec%95%85%ec%84%b1%ec%bd%94%eb%93%9c%ea%b0%80-%ea%b8%88%ec%9c%b5-%eb%8d%b0%ec%9d%b4%ed%84%b0%eb%a5%bc-%ed%9b%94%ec%b9%a0-%ec%88%98-%ec%9e%88%ec%9d%8c\/\"><span class=\"screen-reader-text\">\uae08\uc735 \ub370\uc774\ud130\ub97c \ud0c8\ucde8\ud558\ub294 \uc548\ub4dc\ub85c\uc774\ub4dc \uba40\uc6e8\uc5b4<\/span> <strong>\uacc4\uc18d \uc77d\uae30<\/strong><\/a><\/p>","protected":false},"author":1,"featured_media":246,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-245","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Android Malware Can Steal Financial Data | Security Briefing<\/title>\n<meta name=\"description\" content=\"How to protect yourself from android malware that steals financial data and can bypass multi-factor authentication.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ko\/\uba40\uc6e8\uc5b4-102\/\uc548\ub4dc\ub85c\uc774\ub4dc-\uc545\uc131\ucf54\ub4dc\uac00-\uae08\uc735-\ub370\uc774\ud130\ub97c-\ud6d4\uce60-\uc218-\uc788\uc74c\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Android Malware Can Steal Financial Data | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"How to protect yourself from android malware that steals financial data and can bypass multi-factor authentication.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ko\/\uba40\uc6e8\uc5b4-102\/\uc548\ub4dc\ub85c\uc774\ub4dc-\uc545\uc131\ucf54\ub4dc\uac00-\uae08\uc735-\ub370\uc774\ud130\ub97c-\ud6d4\uce60-\uc218-\uc788\uc74c\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-22T15:22:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"719\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\uae00\uc4f4\uc774\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data2\" content=\"3\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Android Malware Can Steal Financial Data\",\"datePublished\":\"2022-06-22T15:22:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/\"},\"wordCount\":585,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg\",\"articleSection\":[\"Malware\"],\"inLanguage\":\"ko-KR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/\",\"url\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/\",\"name\":\"Android Malware Can Steal Financial Data | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg\",\"datePublished\":\"2022-06-22T15:22:03+00:00\",\"description\":\"How to protect yourself from android malware that steals financial data and can bypass multi-factor authentication.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg\",\"width\":1000,\"height\":719,\"caption\":\"android-malware-can-steal-financial-data\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Android Malware Can Steal Financial Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/ko\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\uc548\ub4dc\ub85c\uc774\ub4dc \uc545\uc131\ucf54\ub4dc\uac00 \uae08\uc735 \ub370\uc774\ud130\ub97c \ud0c8\ucde8\ud560 \uc218 \uc788\uc74c | \ubcf4\uc548 \ube0c\ub9ac\ud551","description":"\uae08\uc735 \ub370\uc774\ud130\ub97c \ud6d4\uce58\uace0 \ub2e4\uc911 \uc778\uc99d\uc744 \uc6b0\ud68c\ud560 \uc218 \uc788\ub294 \uc548\ub4dc\ub85c\uc774\ub4dc \uc545\uc131\ucf54\ub4dc\ub85c\ubd80\ud130 \uc790\uc2e0\uc744 \ubcf4\ud638\ud558\ub294 \ubc29\ubc95.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ko\/\uba40\uc6e8\uc5b4-102\/\uc548\ub4dc\ub85c\uc774\ub4dc-\uc545\uc131\ucf54\ub4dc\uac00-\uae08\uc735-\ub370\uc774\ud130\ub97c-\ud6d4\uce60-\uc218-\uc788\uc74c\/","og_locale":"ko_KR","og_type":"article","og_title":"Android Malware Can Steal Financial Data | Security Briefing","og_description":"How to protect yourself from android malware that steals financial data and can bypass multi-factor authentication.","og_url":"https:\/\/securitybriefing.net\/ko\/\uba40\uc6e8\uc5b4-102\/\uc548\ub4dc\ub85c\uc774\ub4dc-\uc545\uc131\ucf54\ub4dc\uac00-\uae08\uc735-\ub370\uc774\ud130\ub97c-\ud6d4\uce60-\uc218-\uc788\uc74c\/","og_site_name":"Security Briefing","article_published_time":"2022-06-22T15:22:03+00:00","og_image":[{"width":1000,"height":719,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"\uae00\uc4f4\uc774":"security","\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"3\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Android Malware Can Steal Financial Data","datePublished":"2022-06-22T15:22:03+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/"},"wordCount":585,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg","articleSection":["Malware"],"inLanguage":"ko-KR"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/","url":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/","name":"\uc548\ub4dc\ub85c\uc774\ub4dc \uc545\uc131\ucf54\ub4dc\uac00 \uae08\uc735 \ub370\uc774\ud130\ub97c \ud0c8\ucde8\ud560 \uc218 \uc788\uc74c | \ubcf4\uc548 \ube0c\ub9ac\ud551","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg","datePublished":"2022-06-22T15:22:03+00:00","description":"\uae08\uc735 \ub370\uc774\ud130\ub97c \ud6d4\uce58\uace0 \ub2e4\uc911 \uc778\uc99d\uc744 \uc6b0\ud68c\ud560 \uc218 \uc788\ub294 \uc548\ub4dc\ub85c\uc774\ub4dc \uc545\uc131\ucf54\ub4dc\ub85c\ubd80\ud130 \uc790\uc2e0\uc744 \ubcf4\ud638\ud558\ub294 \ubc29\ubc95.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg","width":1000,"height":719,"caption":"android-malware-can-steal-financial-data"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Android Malware Can Steal Financial Data"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"\ubcf4\uc548","image":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin\uc740 \uc815\ubd80 \uae30\uc220\uc758 \uc120\uc784 \uc2a4\ud0dc\ud504 \uc791\uac00\uc785\ub2c8\ub2e4. \uc774\uc804\uc5d0\ub294 PYMNTS\uc640 \ubca0\uc774 \uc2a4\ud14c\uc774\ud2b8 \ubc30\ub108\uc5d0 \uae00\uc744 \uc37c\uc73c\uba70 \uce74\ub124\uae30 \uba5c\ub860\uc5d0\uc11c \ubb38\uc608\ucc3d\uc791 \ud559\uc0ac \ud559\uc704\ub97c \ubc1b\uc558\uc2b5\ub2c8\ub2e4. \ud604\uc7ac \ubcf4\uc2a4\ud134 \uc678\uacfd\uc5d0 \uac70\uc8fc\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/ko\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/comments?post=245"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/245\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media\/246"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media?parent=245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/categories?post=245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/tags?post=245"}],"curies":[{"name":"\uc6cc\ub4dc\ud504\ub808\uc2a4 (wp)","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}