{"id":245,"date":"2022-06-22T15:22:03","date_gmt":"2022-06-22T15:22:03","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=245"},"modified":"2022-06-22T15:22:03","modified_gmt":"2022-06-22T15:22:03","slug":"malware-android-co-the-danh-cap-du-lieu-tai-chinh","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/vi\/phan-mem-doc-hai\/malware-android-co-the-danh-cap-du-lieu-tai-chinh\/","title":{"rendered":"Ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i Android c\u00f3 th\u1ec3 \u0111\u00e1nh c\u1eafp d\u1eef li\u1ec7u t\u00e0i ch\u00ednh"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Ba n\u0103m tr\u01b0\u1edbc, s\u1ed1 l\u01b0\u1ee3ng nhi\u1ec5m ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i \u0111\u00e3 t\u0103ng l\u00ean v\u00e0 nhi\u1ec1u ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i m\u1edbi \u0111\u00e3 \u0111\u01b0\u1ee3c ph\u00e1t hi\u1ec7n. Ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i n\u00e0y c\u00f3 th\u1ec3 \u0111\u00e1nh c\u1eafp d\u1eef li\u1ec7u t\u00e0i ch\u00ednh b\u1eb1ng c\u00e1ch b\u1ecf qua x\u00e1c th\u1ef1c \u0111a y\u1ebfu t\u1ed1. C\u00e1c nh\u00e0 nghi\u00ean c\u1ee9u t\u1ea1i F5 Labs \u0111\u00e3 ph\u00e1t hi\u1ec7n ra lo\u1ea1i vi-r\u00fat m\u00e0 h\u1ecd \u0111\u1eb7t t\u00ean l\u00e0 &quot;Exobot&quot;. Ng\u01b0\u1eddi ta tin r\u1eb1ng lo\u1ea1i vi-r\u00fat n\u00e0y \u0111\u00e3 l\u00e2y lan qua c\u00e1c trang web l\u1eeba \u0111\u1ea3o v\u00e0 email r\u00e1c. Exobot m\u1eddi ng\u01b0\u1eddi d\u00f9ng t\u1ea3i xu\u1ed1ng v\u00ec ngh\u0129 r\u1eb1ng \u0111\u00f3 l\u00e0 tr\u00ecnh theo d\u00f5i ti\u1ec1n \u0111i\u1ec7n t\u1eed ph\u1ed5 bi\u1ebfn.\u00a0<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Chi ti\u1ebft v\u1ec1 ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i MaliBot Android.<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">C\u00e1c nh\u00e0 nghi\u00ean c\u1ee9u t\u1ea1i F-Secure l\u1ea7n \u0111\u1ea7u ti\u00ean ph\u00e1t hi\u1ec7n ra ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i Exobot. Ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i n\u00e0y l\u00e0 m\u1ed9t ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i tinh vi c\u00f3 th\u1ec3 v\u01b0\u1ee3t qua x\u00e1c th\u1ef1c hai y\u1ebfu t\u1ed1 v\u00e0 \u0111\u00e1nh c\u1eafp d\u1eef li\u1ec7u t\u00e0i ch\u00ednh. Ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i \u0111\u01b0\u1ee3c ph\u00e2n ph\u1ed1i th\u00f4ng qua c\u00e1c trang web l\u1eeba \u0111\u1ea3o v\u00e0 tin nh\u1eafn smishing. Sau khi c\u00e0i \u0111\u1eb7t, ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i y\u00eau c\u1ea7u quy\u1ec1n \u0111\u1ec3 ph\u1ee7 l\u00ean c\u00e1c \u1ee9ng d\u1ee5ng kh\u00e1c v\u00e0 truy c\u1eadp tin nh\u1eafn SMS, danh s\u00e1ch li\u00ean l\u1ea1c v\u00e0 nh\u1eadt k\u00fd cu\u1ed9c g\u1ecdi. V\u1edbi c\u00e1c quy\u1ec1n n\u00e0y trong tay, ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i c\u00f3 th\u1ec3 ch\u1eb7n m\u00e3 th\u00f4ng b\u00e1o m\u1ed9t l\u1ea7n (OTP) \u0111\u01b0\u1ee3c g\u1eedi qua SMS cho c\u00e1c \u1ee9ng d\u1ee5ng ng\u00e2n h\u00e0ng v\u00e0 v\u01b0\u1ee3t qua x\u00e1c th\u1ef1c hai y\u1ebfu t\u1ed1.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Exobot c\u0169ng c\u00f3 th\u1ec3 ghi \u00e2m c\u00e1c cu\u1ed9c g\u1ecdi \u0111\u1ebfn d\u1ecbch v\u1ee5 kh\u00e1ch h\u00e0ng \u0111\u1ec3 thu th\u1eadp th\u00eam th\u00f4ng tin \u0111\u0103ng nh\u1eadp ho\u1eb7c th\u00f4ng tin nh\u1ea1y c\u1ea3m kh\u00e1c. N\u1ebfu b\u1ea1n ngh\u0129 r\u1eb1ng m\u00ecnh c\u00f3 th\u1ec3 \u0111\u00e3 t\u1ea3i xu\u1ed1ng ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i Exobot, \u0111i\u1ec1u quan tr\u1ecdng l\u00e0 ph\u1ea3i g\u1ee1 c\u00e0i \u0111\u1eb7t b\u1ea5t k\u1ef3 \u1ee9ng d\u1ee5ng \u0111\u00e1ng ng\u1edd n\u00e0o v\u00e0 thay \u0111\u1ed5i m\u1eadt kh\u1ea9u c\u1ee7a b\u1ea1n ngay l\u1eadp t\u1ee9c. B\u1ea1n c\u0169ng n\u00ean b\u1eadt x\u00e1c th\u1ef1c hai y\u1ebfu t\u1ed1 tr\u00ean t\u1ea5t c\u1ea3 c\u00e1c t\u00e0i kho\u1ea3n h\u1ed7 tr\u1ee3 t\u00ednh n\u0103ng n\u00e0y. V\u00e0 cu\u1ed1i c\u00f9ng, h\u00e3y ch\u1eafc ch\u1eafn ch\u1ec9 t\u1ea3i xu\u1ed1ng \u1ee9ng d\u1ee5ng t\u1eeb c\u00e1c ngu\u1ed3n \u0111\u00e1ng tin c\u1eady nh\u01b0 Google Play Store.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i MaliBot tr\u00ean Android c\u00f3 th\u1ec3 v\u01b0\u1ee3t qua x\u00e1c th\u1ef1c hai y\u1ebfu t\u1ed1.<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Sau khi c\u00e0i \u0111\u1eb7t, ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i y\u00eau c\u1ea7u c\u00e1c quy\u1ec1n th\u01b0\u1eddng \u0111\u01b0\u1ee3c coi l\u00e0 \u0111\u00e1ng ng\u1edd, ch\u1eb3ng h\u1ea1n nh\u01b0 quy\u1ec1n truy c\u1eadp v\u00e0o tin nh\u1eafn SMS, danh s\u00e1ch li\u00ean l\u1ea1c v\u00e0 nh\u1eadt k\u00fd cu\u1ed9c g\u1ecdi. N\u00f3 c\u0169ng y\u00eau c\u1ea7u quy\u1ec1n \u0111\u1ec3 ph\u1ee7 l\u00ean c\u00e1c \u1ee9ng d\u1ee5ng kh\u00e1c. V\u1edbi c\u00e1c quy\u1ec1n n\u00e0y trong tay, ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i c\u00f3 th\u1ec3 ch\u1eb7n m\u00e3 th\u00f4ng b\u00e1o m\u1ed9t l\u1ea7n (OTP) \u0111\u01b0\u1ee3c g\u1eedi qua SMS cho c\u00e1c \u1ee9ng d\u1ee5ng ng\u00e2n h\u00e0ng v\u00e0 b\u1ecf qua x\u00e1c th\u1ef1c hai y\u1ebfu t\u1ed1. \u1ee8ng d\u1ee5ng c\u0169ng c\u00f3 th\u1ec3 ghi l\u1ea1i c\u00e1c cu\u1ed9c g\u1ecdi \u0111i\u1ec7n tho\u1ea1i \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n \u0111\u1ebfn b\u1ed9 ph\u1eadn d\u1ecbch v\u1ee5 kh\u00e1ch h\u00e0ng \u0111\u1ec3 c\u00f3 th\u00eam th\u00f4ng tin \u0111\u0103ng nh\u1eadp ho\u1eb7c th\u00f4ng tin nh\u1ea1y c\u1ea3m kh\u00e1c.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">&quot;\u0110\u00e2y l\u00e0 m\u1ed9t ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i Android r\u1ea5t tinh vi&quot;, Craig Young, m\u1ed9t nh\u00e0 nghi\u00ean c\u1ee9u b\u1ea3o m\u1eadt ch\u00ednh t\u1ea1i Nh\u00f3m nghi\u00ean c\u1ee9u v\u1ec1 l\u1ed7 h\u1ed5ng v\u00e0 ph\u01a1i nhi\u1ec5m (VERT) c\u1ee7a Tripwire cho bi\u1ebft. &quot;C\u00e1c nh\u00e0 ph\u00e1t tri\u1ec3n \u0111\u00e3 b\u1ecf nhi\u1ec1u c\u00f4ng s\u1ee9c \u0111\u1ec3 l\u00e0m cho n\u00f3 kh\u00f3 b\u1ecb ph\u00e1t hi\u1ec7n v\u00e0 ph\u00e2n t\u00edch&quot;.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">X\u00e1c th\u1ef1c hai y\u1ebfu t\u1ed1 l\u00e0 g\u00ec?<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">X\u00e1c th\u1ef1c hai y\u1ebfu t\u1ed1, th\u01b0\u1eddng \u0111\u01b0\u1ee3c g\u1ecdi l\u00e0 x\u00e1c minh hai b\u01b0\u1edbc, l\u00e0 m\u1ed9t lo\u1ea1i x\u00e1c minh danh t\u00ednh s\u1eed d\u1ee5ng hai y\u1ebfu t\u1ed1: m\u1eadt kh\u1ea9u v\u00e0 m\u00e3 m\u1ed9t l\u1ea7n \u0111\u01b0\u1ee3c g\u1eedi cho b\u1ea1n qua tin nh\u1eafn v\u0103n b\u1ea3n. Ngay c\u1ea3 khi k\u1ebb t\u1ea5n c\u00f4ng c\u00f3 quy\u1ec1n truy c\u1eadp v\u00e0o m\u1eadt kh\u1ea9u c\u1ee7a b\u1ea1n, ch\u00fang v\u1eabn c\u1ea7n quy\u1ec1n truy c\u1eadp v\u00e0o \u0111i\u1ec7n tho\u1ea1i c\u1ee7a b\u1ea1n \u0111\u1ec3 \u0111\u0103ng nh\u1eadp v\u00ec ch\u00fang c\u0169ng c\u1ea7n quy\u1ec1n truy c\u1eadp v\u00e0o v\u1ecb tr\u00ed b\u1ea1n nh\u1eadn \u0111\u01b0\u1ee3c m\u00e3 m\u1ed9t l\u1ea7n.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">L\u00e0m th\u1ebf n\u00e0o \u0111\u1ec3 b\u1eadt x\u00e1c th\u1ef1c hai y\u1ebfu t\u1ed1?<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">X\u00e1c th\u1ef1c hai y\u1ebfu t\u1ed1 l\u00e0 m\u1ed9t l\u1edbp b\u1ea3o m\u1eadt b\u1ed5 sung c\u00f3 th\u1ec3 b\u1ea3o v\u1ec7 t\u00e0i kho\u1ea3n tr\u1ef1c tuy\u1ebfn c\u1ee7a b\u1ea1n kh\u1ecfi b\u1ecb hack. N\u1ebfu b\u1ea1n ch\u01b0a s\u1eed d\u1ee5ng x\u00e1c th\u1ef1c hai y\u1ebfu t\u1ed1, vi\u1ec7c b\u1eadt x\u00e1c th\u1ef1c hai y\u1ebfu t\u1ed1 tr\u00ean t\u1ea5t c\u1ea3 c\u00e1c t\u00e0i kho\u1ea3n h\u1ed7 tr\u1ee3 l\u00e0 r\u1ea5t quan tr\u1ecdng. \u0110\u1ec3 b\u1eadt x\u00e1c th\u1ef1c hai y\u1ebfu t\u1ed1, b\u1ea1n ph\u1ea3i \u0111\u0103ng nh\u1eadp v\u00e0o t\u00e0i kho\u1ea3n c\u1ee7a m\u00ecnh v\u00e0 v\u00e0o ph\u1ea7n c\u00e0i \u0111\u1eb7t b\u1ea3o m\u1eadt. T\u1eeb \u0111\u00f3, b\u1ea1n s\u1ebd c\u1ea7n t\u1ea1o m\u00e3 m\u1ed9t l\u1ea7n \u0111\u01b0\u1ee3c g\u1eedi cho b\u1ea1n qua SMS ho\u1eb7c \u1ee9ng d\u1ee5ng. Sau khi c\u00f3 m\u00e3, b\u1ea1n s\u1ebd nh\u1eadp m\u00e3 khi \u0111\u01b0\u1ee3c nh\u1eafc \u0111\u0103ng nh\u1eadp. \u0110i\u1ec1u quan tr\u1ecdng c\u1ea7n l\u01b0u \u00fd l\u00e0 b\u1ea1n ch\u1ec9 n\u00ean s\u1eed d\u1ee5ng c\u00e1c \u1ee9ng d\u1ee5ng t\u1eeb c\u00e1c ngu\u1ed3n \u0111\u00e1ng tin c\u1eady nh\u01b0 C\u1eeda h\u00e0ng Google Play khi t\u1ea1o m\u00e3 m\u1ed9t l\u1ea7n.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">D\u00f2ng cu\u1ed1i c\u00f9ng<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i Exobot l\u00e0 ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i Android tinh vi c\u00f3 th\u1ec3 v\u01b0\u1ee3t qua x\u00e1c th\u1ef1c hai y\u1ebfu t\u1ed1 v\u00e0 \u0111\u00e1nh c\u1eafp d\u1eef li\u1ec7u t\u00e0i ch\u00ednh. N\u1ebfu b\u1ea1n ngh\u0129 r\u1eb1ng m\u00ecnh c\u00f3 th\u1ec3 \u0111\u00e3 t\u1ea3i xu\u1ed1ng ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i Exobot, \u0111i\u1ec1u quan tr\u1ecdng l\u00e0 ph\u1ea3i g\u1ee1 c\u00e0i \u0111\u1eb7t m\u1ecdi \u1ee9ng d\u1ee5ng \u0111\u00e1ng ng\u1edd v\u00e0 thay \u0111\u1ed5i m\u1eadt kh\u1ea9u ngay l\u1eadp t\u1ee9c. B\u1ea1n c\u0169ng n\u00ean b\u1eadt x\u00e1c th\u1ef1c hai y\u1ebfu t\u1ed1 tr\u00ean t\u1ea5t c\u1ea3 c\u00e1c t\u00e0i kho\u1ea3n h\u1ed7 tr\u1ee3. V\u00e0 cu\u1ed1i c\u00f9ng, h\u00e3y \u0111\u1ea3m b\u1ea3o ch\u1ec9 t\u1ea3i xu\u1ed1ng \u1ee9ng d\u1ee5ng t\u1eeb c\u00e1c ngu\u1ed3n \u0111\u00e1ng tin c\u1eady nh\u01b0 C\u1eeda h\u00e0ng Google Play.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Ba n\u0103m tr\u01b0\u1edbc, s\u1ed1 l\u01b0\u1ee3ng nhi\u1ec5m ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i \u0111\u00e3 t\u0103ng l\u00ean v\u00e0 nhi\u1ec1u ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i m\u1edbi \u0111\u00e3 \u0111\u01b0\u1ee3c ph\u00e1t hi\u1ec7n. Ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i n\u00e0y c\u00f3 th\u1ec3 \u0111\u00e1nh c\u1eafp d\u1eef li\u1ec7u t\u00e0i ch\u00ednh b\u1eb1ng c\u00e1ch b\u1ecf qua x\u00e1c th\u1ef1c \u0111a y\u1ebfu t\u1ed1. C\u00e1c nh\u00e0 nghi\u00ean c\u1ee9u t\u1ea1i F5 Labs\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/vi\/phan-mem-doc-hai\/malware-android-co-the-danh-cap-du-lieu-tai-chinh\/\">Ti\u1ebfp t\u1ee5c \u0111\u1ecdc <span class=\"screen-reader-text\">Ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i Android c\u00f3 th\u1ec3 \u0111\u00e1nh c\u1eafp d\u1eef li\u1ec7u t\u00e0i ch\u00ednh<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":246,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-245","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Android Malware Can Steal Financial Data | Security Briefing<\/title>\n<meta name=\"description\" content=\"How to protect yourself from android malware that steals financial data and can bypass multi-factor authentication.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/vi\/phan-mem-doc-hai\/malware-android-co-the-danh-cap-du-lieu-tai-chinh\/\" \/>\n<meta property=\"og:locale\" content=\"vi_VN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Android Malware Can Steal Financial Data | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"How to protect yourself from android malware that steals financial data and can bypass multi-factor authentication.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/vi\/phan-mem-doc-hai\/malware-android-co-the-danh-cap-du-lieu-tai-chinh\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-22T15:22:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"719\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 ph\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Android Malware Can Steal Financial Data\",\"datePublished\":\"2022-06-22T15:22:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/\"},\"wordCount\":585,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg\",\"articleSection\":[\"Malware\"],\"inLanguage\":\"vi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/\",\"url\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/\",\"name\":\"Android Malware Can Steal Financial Data | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg\",\"datePublished\":\"2022-06-22T15:22:03+00:00\",\"description\":\"How to protect yourself from android malware that steals financial data and can bypass multi-factor authentication.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#breadcrumb\"},\"inLanguage\":\"vi\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg\",\"width\":1000,\"height\":719,\"caption\":\"android-malware-can-steal-financial-data\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Android Malware Can Steal Financial Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/vi\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i Android c\u00f3 th\u1ec3 \u0111\u00e1nh c\u1eafp d\u1eef li\u1ec7u t\u00e0i ch\u00ednh | B\u1ea3n tin an ninh","description":"C\u00e1ch b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n kh\u1ecfi ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i tr\u00ean Android c\u00f3 kh\u1ea3 n\u0103ng \u0111\u00e1nh c\u1eafp d\u1eef li\u1ec7u t\u00e0i ch\u00ednh v\u00e0 c\u00f3 th\u1ec3 v\u01b0\u1ee3t qua x\u00e1c th\u1ef1c \u0111a y\u1ebfu t\u1ed1.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/vi\/phan-mem-doc-hai\/malware-android-co-the-danh-cap-du-lieu-tai-chinh\/","og_locale":"vi_VN","og_type":"article","og_title":"Android Malware Can Steal Financial Data | Security Briefing","og_description":"How to protect yourself from android malware that steals financial data and can bypass multi-factor authentication.","og_url":"https:\/\/securitybriefing.net\/vi\/phan-mem-doc-hai\/malware-android-co-the-danh-cap-du-lieu-tai-chinh\/","og_site_name":"Security Briefing","article_published_time":"2022-06-22T15:22:03+00:00","og_image":[{"width":1000,"height":719,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi":"security","\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc":"3 ph\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Android Malware Can Steal Financial Data","datePublished":"2022-06-22T15:22:03+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/"},"wordCount":585,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg","articleSection":["Malware"],"inLanguage":"vi"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/","url":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/","name":"Ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i Android c\u00f3 th\u1ec3 \u0111\u00e1nh c\u1eafp d\u1eef li\u1ec7u t\u00e0i ch\u00ednh | B\u1ea3n tin an ninh","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg","datePublished":"2022-06-22T15:22:03+00:00","description":"C\u00e1ch b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n kh\u1ecfi ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i tr\u00ean Android c\u00f3 kh\u1ea3 n\u0103ng \u0111\u00e1nh c\u1eafp d\u1eef li\u1ec7u t\u00e0i ch\u00ednh v\u00e0 c\u00f3 th\u1ec3 v\u01b0\u1ee3t qua x\u00e1c th\u1ef1c \u0111a y\u1ebfu t\u1ed1.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#breadcrumb"},"inLanguage":"vi","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/"]}]},{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg","width":1000,"height":719,"caption":"android-malware-can-steal-financial-data"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Android Malware Can Steal Financial Data"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"B\u00e1o C\u00e1o An Ninh","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"B\u00e1o C\u00e1o An Ninh","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"b\u1ea3o v\u1ec7","image":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin l\u00e0 m\u1ed9t bi\u00ean t\u1eadp vi\u00ean c\u1ea5p cao c\u1ee7a Government Technology. Tr\u01b0\u1edbc \u0111\u00e2y c\u00f4 \u0111\u00e3 vi\u1ebft cho PYMNTS v\u00e0 The Bay State Banner, v\u00e0 c\u00f3 b\u1eb1ng C\u1eed nh\u00e2n Ngh\u1ec7 thu\u1eadt s\u00e1ng t\u00e1c c\u1ee7a tr\u01b0\u1eddng Carnegie Mellon. C\u00f4 s\u1ed1ng \u1edf ngo\u1ea1i \u00f4 Boston.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/vi\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/comments?post=245"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/245\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media\/246"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media?parent=245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/categories?post=245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/tags?post=245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}