{"id":224682904,"date":"2023-12-31T22:30:53","date_gmt":"2024-01-01T03:30:53","guid":{"rendered":"https:\/\/phonescanada.com\/?p=224682904"},"modified":"2024-01-01T12:07:57","modified_gmt":"2024-01-01T17:07:57","slug":"protecting-your-android-phone-from-the-chameleon-trojan-that-drains-your-bank-account","status":"publish","type":"post","link":"https:\/\/phonescanada.com\/fr\/protecting-your-android-phone-from-the-chameleon-trojan-that-drains-your-bank-account\/","title":{"rendered":"Prot\u00e9ger votre t\u00e9l\u00e9phone Android du cheval de Troie Chameleon qui draine votre compte bancaire"},"content":{"rendered":"<p>A new Android banking Trojan called Chameleon has been spotted, and it\u2019s specifically targetting Android users to steal their cash from banking and financial apps. The malware tricks victims into granting it permissions by pretending to be a legitimate app, and then can monitor how the phone is being used and intercept credentials. The most [\u2026]<\/p>\n<p>The most concerning thing about Chameleon is that it bypasses a new \u201crestricted setting feature\u201d introduced in Android 13, which allows the user to decide which apps can access certain features and settings on the device. The malware tricks the victim into granting access to the \u201crestricted setting feature\u201d without the user\u2019s consent and can disable biometric security features such as facial recognition and fingerprint scanners, ultimately taking control of the device.<\/p>\n<p>The Chameleon Trojan uses a fake lock screen to trick users into entering their PIN, ultimately granting access to the phone and banking and financial apps, as well as obtaining other personal information. This enables the malware to send money to the attackers\u2019 accounts or purchase goods online without the user\u2019s knowledge.<\/p>\n<p>There is an \u201cimproved\u201d version of the Chameleon trojan that opens an HTML webpage and requests permission from users to change their accessibility settings. This \u201cimprovement\u201d helps the attackers avoid detection by scheduling tasks and exploiting the victim\u2019s device when it isn\u2019t usually being used.<\/p>\n<p>To protect your Android phone, avoid sideloading apps from third-party app stores and stick to the Google Play Store or the Samsung Galaxy Store if you have a Galaxy-branded device. Ensure that your Android phone is running the latest version of Android and install any pending updates. Since the Chameleon Trojan uses a keylogger to record passwords, change the passwords to all of your apps, starting with the financial apps. Use strong and unique passwords and avoid changing them on the infected phone but instead use a trusted device like your PC or Mac. Check online accounts for unusual activity and monitor your credit reports for signs of identity theft or fraud. If your banking and credit card information appears to be compromised, inform the banks and credit card companies immediately.<\/p>\n<p>You can ensure that your device has no traces of malware left by performing a factory reset, but make sure to back up your device before doing so and restore it using a trusted device. Although it may not be ideal, a factory reset could help protect your financial accounts from being drained.<\/p>","protected":false},"excerpt":{"rendered":"<p>A new Android banking Trojan called Chameleon has been spotted, and it&#8217;s specifically targetting Android users to steal their cash from banking and financial apps. The malware tricks victims into granting it permissions by pretending to be a legitimate app, and then can monitor how the phone is being used and intercept credentials. The most [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":224682905,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"wds_primary_category":255,"footnotes":""},"categories":[255],"tags":[],"class_list":["post-224682904","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-apple-tips-news"],"_links":{"self":[{"href":"https:\/\/phonescanada.com\/fr\/wp-json\/wp\/v2\/posts\/224682904","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phonescanada.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phonescanada.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phonescanada.com\/fr\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/phonescanada.com\/fr\/wp-json\/wp\/v2\/comments?post=224682904"}],"version-history":[{"count":0,"href":"https:\/\/phonescanada.com\/fr\/wp-json\/wp\/v2\/posts\/224682904\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phonescanada.com\/fr\/wp-json\/wp\/v2\/media\/224682905"}],"wp:attachment":[{"href":"https:\/\/phonescanada.com\/fr\/wp-json\/wp\/v2\/media?parent=224682904"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phonescanada.com\/fr\/wp-json\/wp\/v2\/categories?post=224682904"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phonescanada.com\/fr\/wp-json\/wp\/v2\/tags?post=224682904"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}