Face off: Attackers are stealing biometrics to access victims’ bank accounts

Posted under: Smart Technologies
Date: 2024-02-27
Face off: Attackers are stealing biometrics to access victims’ bank accounts

In Thailand and Vietnam, cybercriminals exploit biometric authentication by creating fraudulent apps like GoldPickaxe.iOS, which deceive users by posing as legitimate services, such as digital pension access. These apps prompt victims to provide facial data, under the guise of authentication, including instructions for various facial expressions, enabling the creation of deepfake videos. Once in possession of these videos, hackers can infiltrate victims' banking applications, perpetrating financial fraud with ease. Group-IB advises caution, recommending users to avoid clicking on suspicious links, downloading apps only from official platforms like Google Play Store or Apple App Store, and scrutinizing app permissions diligently. Signs of malware infection include unusual battery drain, unfamiliar apps, and erratic behavior such as unauthorized calls or messages.

Read more at: venturebeat.com

Related videos

Face off: Attackers are stealing biometrics to access victims’ bank accounts

Posted under: Smart Technologies
Date: 2024-02-27
Face off: Attackers are stealing biometrics to access victims’ bank accounts

In Thailand and Vietnam, cybercriminals exploit biometric authentication by creating fraudulent apps like GoldPickaxe.iOS, which deceive users by posing as legitimate services, such as digital pension access. These apps prompt victims to provide facial data, under the guise of authentication, including instructions for various facial expressions, enabling the creation of deepfake videos. Once in possession of these videos, hackers can infiltrate victims' banking applications, perpetrating financial fraud with ease. Group-IB advises caution, recommending users to avoid clicking on suspicious links, downloading apps only from official platforms like Google Play Store or Apple App Store, and scrutinizing app permissions diligently. Signs of malware infection include unusual battery drain, unfamiliar apps, and erratic behavior such as unauthorized calls or messages.

Read more at: venturebeat.com
Open-source: The power of collective information

Open-source: The power of collective information

Open-source: The power of collective infor...

Elevate Your Sales Using Managed Services - Don't Miss Out!

Elevate Your Sales Using Managed Services - Don't Miss Out!

Elevate Your Sales Using Managed Services ...

How CRM Transforms Customer Relationships? #crm #technology #technews #business #businessautomation

How CRM Transforms Customer Relationships? #crm #technology ...

How CRM Transforms Customer Relationships?...