{"id":245,"date":"2022-06-22T15:22:03","date_gmt":"2022-06-22T15:22:03","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=245"},"modified":"2022-06-22T15:22:03","modified_gmt":"2022-06-22T15:22:03","slug":"android-malware-kan-financiele-gegevens-stelen","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/nl\/malware-102\/android-malware-kan-financiele-gegevens-stelen\/","title":{"rendered":"Android-malware kan financi\u00eble gegevens stelen"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Drie jaar geleden was het aantal malware-infecties toegenomen en was er nieuwe malware ontdekt. Deze malware kon financi\u00eble gegevens stelen door multi-factor authenticatie te omzeilen. Onderzoekers van F5 Labs ontdekten het virus, dat ze \"Exobot\" noemden. Men denkt dat het virus zich heeft verspreid via frauduleuze websites en spam e-mails. Exobot nodigt gebruikers uit om het te downloaden, denkend dat het een populaire cryptocurrency tracker is.\u00a0<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Details van MaliBot Android-malware.<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Onderzoekers van F-Secure ontdekten voor het eerst de Exobot-malware. De malware is een geavanceerde malware die twee-factor authenticatie kan omzeilen en financi\u00eble gegevens kan stelen. De malware wordt verspreid via frauduleuze websites en smishing. Eenmaal ge\u00efnstalleerd vraagt de malware toestemming om andere apps te overlappen en toegang te krijgen tot sms-berichten, contactlijsten en gesprekslogboeken. Met deze rechten in de hand kan de malware one-time passcodes (OTP's) onderscheppen die via sms worden verzonden voor bank-apps en tweefactorauthenticatie omzeilen.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Exobot kan ook telefoongesprekken met de klantenservice opnemen om extra inloggegevens of andere gevoelige informatie te verkrijgen. Als je denkt dat je de Exobot-malware hebt gedownload, is het belangrijk om verdachte apps te verwijderen en je wachtwoorden onmiddellijk te wijzigen. Je moet ook tweefactorauthenticatie inschakelen op alle accounts die dit ondersteunen. En tot slot, zorg ervoor dat je alleen apps downloadt van vertrouwde bronnen zoals de Google Play Store.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">De MaliBot Android-malware omzeilt twee-factor authenticatie.<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Eenmaal ge\u00efnstalleerd, vraagt de malware om machtigingen die meestal als verdacht worden beschouwd, zoals toegang tot sms-berichten, contactlijsten en gesprekslogboeken. Het vraagt ook toestemming om andere apps te overlappen. Met deze rechten in de hand kan de malware one-time passcodes (OTP's) onderscheppen die via sms worden verzonden voor bankapps en tweefactorauthenticatie omzeilen. De app kan ook telefoongesprekken met de klantenservice opnemen om aanvullende aanmeldgegevens of andere gevoelige informatie te verkrijgen.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">\"Dit is een zeer geavanceerd stuk Android-malware\", zegt Craig Young, hoofdbeveiligingsonderzoeker bij het Vulnerability and Exposure Research Team (VERT) van Tripwire. \"De ontwikkelaars hebben er veel werk in gestoken om het moeilijk detecteerbaar en analyseerbaar te maken.\"<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Wat is twee-factor authenticatie?<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Tweefactorauthenticatie, beter bekend als tweestapsverificatie, is een type identiteitsverificatie dat twee elementen gebruikt: een wachtwoord en een eenmalige code die je per sms ontvangt. Zelfs als de aanvallers toegang hebben tot je wachtwoord, hebben ze toegang tot je telefoon nodig om in te loggen, omdat ze ook toegang moeten hebben tot de locatie waar je de eenmalige code ontvangt.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Hoe schakel je authenticatie met twee factoren in?<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Twee-factor authenticatie is een extra beveiligingslaag die je online accounts kan beschermen tegen hacken. Als je nog geen twee-factor authenticatie gebruikt, is het belangrijk om dit in te schakelen op alle accounts die dit ondersteunen. Om twee-factor authenticatie in te schakelen, moet je inloggen op je account en naar de beveiligingsinstellingen gaan. Vanaf daar moet je een eenmalige code genereren die je via sms of een app wordt toegestuurd. Zodra je de code hebt, voer je deze in wanneer je wordt gevraagd om in te loggen. Het is belangrijk om op te merken dat je alleen apps van betrouwbare bronnen zoals de Google Play Store moet gebruiken om eenmalige codes te genereren.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Conclusie<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">De Exobot malware is een geavanceerde Android malware die twee-factor authenticatie kan omzeilen en financi\u00eble gegevens kan stelen. Als je denkt dat je de Exobot-malware hebt gedownload, is het belangrijk om verdachte apps te verwijderen en je wachtwoorden onmiddellijk te wijzigen. Je moet ook twee-factor authenticatie inschakelen op alle accounts die dit ondersteunen. En ten slotte, zorg ervoor dat je alleen apps downloadt van betrouwbare bronnen zoals de Google Play Store.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Drie jaar geleden was het aantal malware-infecties toegenomen en was er nieuwe malware ontdekt. Deze malware kon financi\u00eble gegevens stelen door multi-factor authenticatie te omzeilen. Onderzoekers van F5 Labs... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/nl\/malware-102\/android-malware-kan-financiele-gegevens-stelen\/\">Lees meer verder <span class=\"screen-reader-text\">Android-malware kan financi\u00eble gegevens stelen<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":246,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-245","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Android Malware Can Steal Financial Data | Security Briefing<\/title>\n<meta name=\"description\" content=\"How to protect yourself from android malware that steals financial data and can bypass multi-factor authentication.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/nl\/malware-102\/android-malware-kan-financiele-gegevens-stelen\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Android Malware Can Steal Financial Data | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"How to protect yourself from android malware that steals financial data and can bypass multi-factor authentication.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/nl\/malware-102\/android-malware-kan-financiele-gegevens-stelen\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-22T15:22:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"719\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Android Malware Can Steal Financial Data\",\"datePublished\":\"2022-06-22T15:22:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/\"},\"wordCount\":585,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg\",\"articleSection\":[\"Malware\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/\",\"url\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/\",\"name\":\"Android Malware Can Steal Financial Data | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg\",\"datePublished\":\"2022-06-22T15:22:03+00:00\",\"description\":\"How to protect yourself from android malware that steals financial data and can bypass multi-factor authentication.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg\",\"width\":1000,\"height\":719,\"caption\":\"android-malware-can-steal-financial-data\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Android Malware Can Steal Financial Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/nl\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Android-malware kan financi\u00eble gegevens stelen | Beveiligingsbriefing","description":"Hoe je jezelf kunt beschermen tegen Android-malware die financi\u00eble gegevens steelt en multi-factor authenticatie kan omzeilen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/nl\/malware-102\/android-malware-kan-financiele-gegevens-stelen\/","og_locale":"nl_NL","og_type":"article","og_title":"Android Malware Can Steal Financial Data | Security Briefing","og_description":"How to protect yourself from android malware that steals financial data and can bypass multi-factor authentication.","og_url":"https:\/\/securitybriefing.net\/nl\/malware-102\/android-malware-kan-financiele-gegevens-stelen\/","og_site_name":"Security Briefing","article_published_time":"2022-06-22T15:22:03+00:00","og_image":[{"width":1000,"height":719,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Geschreven door":"security","Geschatte leestijd":"3 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Android Malware Can Steal Financial Data","datePublished":"2022-06-22T15:22:03+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/"},"wordCount":585,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg","articleSection":["Malware"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/","url":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/","name":"Android-malware kan financi\u00eble gegevens stelen | Beveiligingsbriefing","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg","datePublished":"2022-06-22T15:22:03+00:00","description":"Hoe je jezelf kunt beschermen tegen Android-malware die financi\u00eble gegevens steelt en multi-factor authenticatie kan omzeilen.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg","width":1000,"height":719,"caption":"android-malware-can-steal-financial-data"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Android Malware Can Steal Financial Data"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Beveiligingsbriefing","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Beveiligingsbriefing","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"beveiliging","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin is senior staff writer voor Government Technology. Ze schreef eerder voor PYMNTS en The Bay State Banner en heeft een B.A. in creatief schrijven van Carnegie Mellon. Ze woont buiten Boston.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/nl\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/posts\/245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/comments?post=245"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/posts\/245\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/media\/246"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/media?parent=245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/categories?post=245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/tags?post=245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}