Android Trojan Alert! This Trojan is Stealing Your Money and Personal Details!

A Tordow named Android Malware has been discovered by security researchers of Kaspersky Lab. It is a banking Trojan because it is capable to identify the running programs of a financial application. This Tordow Trojan could get root level privileges of an infected android device to perform critical attacks. According to Security researchers of Kaspersky, Attackers are controlling this Trojan through Command and Control servers to steal victim’s sensitive information.

Why it is a Dangerous Trojan?

After installing this Trojan in an android device, hackers can install special scripts and malicious programs in it. Hackers can steal money from victim’s bank accounts, which he/she is controlling from an android device. Hackers can remotely steal and delete private SMS of victim. If they want to send new texts, they can do this also. Hackers can also block, redirect and record the incoming and outgoing calls of infected device. Hackers are installing hard coded scripts through Tordow Trojan to get access of banking applications and they are transferring money to unknown bitcoin accounts through command and control servers. Hackers are also installing adwares into existing applications of infected device to get more clickbait revenue.

From Where Tordow Trojan Comes?

According to security researchers of Kaspersky, hackers are spreading this Trojan through modified versions of famous android applications. Pokemon Go, Odnoklassniki, Telegram, VKontakte, Subway Surf and DrugVokrug are some of application, which are available on third party stores with a hidden Tordow Trojan. Therefore, always install applications from a legitimate play store and check reviews of application before installing it. For a normal user, it is very difficult to identify that the application is fake because it works like original ones. From the backend, it silently make contact with command and control servers to download the main modules of Tordow Trojan.

What Hackers Want?

To gain the Root Privileges of device.

To steal personal SMS from victim’s device.

To record the calls of victim’s device.

To steal the money from victim’s bank accounts.

Installing Adwares and other malicious applications to get higher clickbait revenue.

To get full remote control of an android device.

The story is not yet finished. Hackers could also hijack browser database of an infected device, through this Tordow Trojan. This is possible in case of Chrome Browser and any default browser of the device. Hackers could steal browser history, cookies, session id’s, saved user name and password and moreover credit or debit card details. Because this Trojan could get root privileges, hackers can control almost every file of the device.