Law enforcement agencies claim to have rendered the FluBot malware inactive. The malicious program was used to steal information such as online banking details.
An international operation involving 11 countries resulted in the disruption of one of the fastest-spreading strains of malware, FluBot, Europol announced.
According to the authorities, FluBot has been spreading aggressively through text messages, stealing passwords, online banking details, and other sensitive information from infected smartphones across the world.
The infrastructure supporting FluBot was successfully disrupted by the Dutch Police in May, leaving the malware inactive, Europos reports.
FluBot was first spotted back in December 2020, when the malware compromised many devices worldwide. The genius of the malware was that it spread via innocent-looking SMS.
The text messages asked Android users to click a link and install an application to track a package delivery or listen to a fake voicemail message. Once installed, FluBot would ask for accessibility permissions.
Later, the hackers would use the newly acquired access to steal banking app credentials or cryptocurrency account details and disable built-in security mechanisms.
Since the malware could access smartphone contact data, it spread like wildfire by sending messages with links to the FluBot malware to numbers in the victims’ address book.
According to Europol, the investigation to identify the individuals behind this global malware campaign is still ongoing.
More from Cybernews:
Subscribe to our newsletter