Daily News Analysis

New Android malware can steal your password by disabling fingerprint and face unlock

stylish_lining

CONTEXT: Dubbed 'Chameleon Trojan', the malware uses the 'Accessibility service' on Android devices to disable fingerprint and face unlock and even tracks the user's app usage habits so it can run when the device is not in use.

  • A new version of the 'Chameleon Trojan' malware has been identified by security researchers.
  • The malware is capable of disabling biometric authentication methods such as fingerprint and face unlock to steal a phone's PIN.

ISSUES:

  •  
  • The Chameleon Trojan attaches itself to legitimate Android apps like Google Chrome to avoid detection and operates in the background.
  •  
  • It claims to have undetectable bundles during runtime, bypassing Google Protect alerts and security software.
  •  
  • On Android 12 and earlier versions, the malware uses the Accessibility service for unauthorized access. On newer versions, it presents an HTML page with instructions to enable the service, bypassing security mechanisms.
  •  
  • The malware steals on-screen content, gains additional permissions, captures PINs and passwords, and uses the stolen PIN to unlock the device and access sensitive information.
  • Chameleon Trojan collects information on users' app usage habits to launch attacks when users are least likely to use their devices.

RECOMMENDATIONS: Avoiding installing Android apps from unofficial Sources, not enabling the 'Accessibility service' for unknown apps, running security scans regularly, and keeping Google Play Protect enabled.

Malware

Malware, short for malicious software, is any program or file designed to harm a computer, network, or server. Think of it as a digital weapon, with various tools in its arsenal depending on the attacker's goals. These can range from stealing data and disrupting operations to causing widespread chaos and destruction.

Some of the most common types of malware, along with their characteristics:

1. Viruses: These are like digital parasites that attach themselves to legitimate programs and replicate, spreading from one system to another. Once activated, they can corrupt files, delete data, or even hijack your entire computer. Imagine a virus like a cold for your computer, but instead of making you sneeze, it steals your files!

2. Worms: Similar to viruses, worms replicate and spread quickly, but they don't need to attach to other programs. They can exploit vulnerabilities in networks or operating systems to infect multiple devices independently. Think of a worm like a self-propelled virus, slithering its way through your network, wreaking havoc wherever it goes.

3. Trojan horses: These are deceptive programs that appear harmless, often masquerading as legitimate software or downloads. Once installed, they unleash their malicious payload, which could be anything from stealing data to installing other malware. Imagine a Trojan horse like a poisoned gift, luring you in with promises but delivering something nasty instead.

4. Spyware: As the name suggests, spyware secretly monitors your computer activity, collecting sensitive information like passwords, financial data, and browsing habits. This information can then be used for identity theft, fraud, or blackmail. Think of spyware like a nosy neighbor peeking through your window, gathering intel on your every move.

Spyware Malware

5. Ransomware: This particularly nasty type of malware encrypts your files, making them inaccessible unless you pay a ransom to the attacker. It's like a digital kidnapper, holding your data hostage until you meet their demands.

6. Adware: While not as harmful as the others, adware bombards you with unwanted advertisements, often intrusive and disruptive. It can also track your browsing habits and target you with personalized ads. Think of adware like a persistent salesperson, constantly popping up and trying to sell you something, even if you're not interested.

These are just a few of the many types of malware out there, and new ones are constantly being developed. It's important to be aware of the dangers and take steps to protect yourself, such as:

  • Using strong passwords and keeping them safe.
  • Installing and updating antivirus and anti-malware software regularly.
  • Being cautious about opening suspicious emails or clicking on unknown links.
  • Backing up your data regularly. By staying vigilant and taking precautions, you can help keep your computer and data safe from the ever-evolving threat of malware.

INS Nistar

The Nistar is India’s first indigenously designed and constructed Diving Support Vessel, marking a step forward in the country’s naval self-reliance. Key Highlights of the Nistar:
Share It

National Commission for Minorities (NCM)

The National Commission for Minorities is currently facing a leadership vacuum. Since the retirement of the previous Chairperson and members in April 2025, the Commission is awaiting the appointme
Share It

North Eastern Region (NER) District Sustainable Development Goals (SDG) Index Report (2023-24)

The second edition of the North Eastern Region (NER) District Sustainable Development Goals (SDG) Index Report was recently released by NITI Aayog, in collaboration with the Ministry of Developmen
Share It

Corporate Average Fuel Efficiency

The study by Nomura researchers calls for reform of India’s Corporate Average Fuel Efficiency (CAFE) norms, particularly to better protect small cars. Key Highlights of the Study: 1.
Share It

Delhi’s Fuel Ban for Old Vehicles

The Delhi Government has faced considerable backlash following its fuel ban for old vehicles under a directive from the Commission for Air Quality Management (CAQM). The ban was implemented to cur
Share It

India State of Forest Report (ISFR) 2023

The India State of Forest Report (ISFR) 2023 has sparked controversy by attributing part of the negative change in forest cover to the Forest Rights Act (FRA), 2006. The claim has been contested b
Share It

International Treaty on Plant Genetic Resources for Food and Agriculture

The International Treaty on Plant Genetic Resources for Food and Agriculture (ITPGRFA) is a crucial international agreement that plays a key role in the conservation and sustainable use of plant g
Share It

Green Climate Fund (GCF)

The Green Climate Fund (GCF) has recently approved over USD 120 million to support climate resilience projects in Ghana, the Maldives, and Mauritania. This funding aims to assist these countries i
Share It

Quad Critical Minerals Initiative

The Quad Critical Minerals Initiative launched by the United States, India, Australia, and Japan marks a significant shift in global geopolitics and economic strategy, especially with regard to cr
Share It

NITI Aayog's Proposal

NITI Aayog's proposed roadmap to boost India's chemical exports is a significant step toward enhancing the country's position in global chemical supply chains and addressing existing i
Share It

Newsletter Subscription


ACQ IAS
ACQ IAS