
403
Sorry!!
Error! We're sorry, but the page you were looking for doesn't exist.
New malware ‘Snowblind’ steals data from Android devices
(MENAFN) The rise of mobile banking has brought unparalleled convenience, allowing users to manage their finances directly from their phones. However, this convenience has also introduced significant security concerns, particularly with the threat of malware designed to steal users' banking credentials.
A new malware, known as Snowblind, has emerged in this context. Snowblind is particularly insidious as it can evade biometrics and other security measures on mobile devices to steal data from various applications. It is currently targeting users in Asia and Africa, focusing on applications that handle sensitive user information.
Alarmingly, Android’s built-in security features inadvertently aid Snowblind, enabling it to bypass the checks meant to prevent malicious apps from infecting devices. This capability allows Snowblind to infiltrate apps before they are thoroughly checked, swiftly circumventing the device’s security protocols to carry out its malicious activities.
Snowblind manipulates the process of how apps are checked and processed, making the device believe it is free of malware. This deception means that users are unlikely to notice any significant changes in performance or signs of intrusion, making the malware particularly stealthy.
The most concerning aspect of Snowblind is its ability to avoid antivirus scans and bypass security checks. Its primary goal is to steal financial credentials from infected devices, including login details and bank account numbers. Additionally, it can hijack user sessions on banking chat programs and steal email and communication data with banks, posing a severe threat to users' financial security.
A new malware, known as Snowblind, has emerged in this context. Snowblind is particularly insidious as it can evade biometrics and other security measures on mobile devices to steal data from various applications. It is currently targeting users in Asia and Africa, focusing on applications that handle sensitive user information.
Alarmingly, Android’s built-in security features inadvertently aid Snowblind, enabling it to bypass the checks meant to prevent malicious apps from infecting devices. This capability allows Snowblind to infiltrate apps before they are thoroughly checked, swiftly circumventing the device’s security protocols to carry out its malicious activities.
Snowblind manipulates the process of how apps are checked and processed, making the device believe it is free of malware. This deception means that users are unlikely to notice any significant changes in performance or signs of intrusion, making the malware particularly stealthy.
The most concerning aspect of Snowblind is its ability to avoid antivirus scans and bypass security checks. Its primary goal is to steal financial credentials from infected devices, including login details and bank account numbers. Additionally, it can hijack user sessions on banking chat programs and steal email and communication data with banks, posing a severe threat to users' financial security.

Legal Disclaimer:
MENAFN provides the
information “as is” without warranty of any kind. We do not accept
any responsibility or liability for the accuracy, content, images,
videos, licenses, completeness, legality, or reliability of the information
contained in this article. If you have any complaints or copyright
issues related to this article, kindly contact the provider above.
Most popular stories
Market Research

- Over US$13 Billion Have Trusted Pendle, Becoming One Of The Largest Defi Protocols On Crypto
- Tapbit At TOKEN2049: Reshaping The Crypto Landscape Through Product Innovation
- Bydfi Joins Korea Blockchain Week 2025 (KBW2025): Deepening Web3 Engagement
- Dupoin Reports Global Growth, Regulatory Coverage, And User Experience Insights
- Superiorstar Prosperity Group Russell Hawthorne Highlights New Machine Learning Risk Framework
- WBTC Strengthens Its Role As Multichain Standard For Bitcoin In Defi
Comments
No comment