{"id":127133,"date":"2021-09-03T11:33:11","date_gmt":"2021-09-03T18:33:11","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=127133"},"modified":"2025-06-03T21:34:55","modified_gmt":"2025-06-04T04:34:55","slug":"phishing-android-malware-targets-taxpayers-in-india","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-android-malware-targets-taxpayers-in-india\/","title":{"rendered":"Phishing\u00a0Android\u00a0Malware\u00a0Targets Taxpayers in\u00a0India"},"content":{"rendered":"<p><span data-contrast=\"auto\">Authored b<\/span><span data-contrast=\"auto\">y\u00a0ChanUng\u00a0Pak\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">McAfee\u2019s\u00a0Mobile\u00a0Research team\u00a0recently\u00a0found a new Android malware,\u00a0Elibomi,\u00a0targeting taxpayers in India. The malware\u00a0steals\u00a0sensitive financial and private information\u00a0via phishing by pretending to be\u00a0a tax-filing\u00a0application.\u00a0We have\u00a0identified two main campaigns\u00a0that used\u00a0different fake app themes\u00a0to lure in taxpayers.\u00a0The first campaign\u00a0from\u00a0November 2020\u00a0pretended to be a fake IT certificate application while\u00a0the second campaign,\u00a0first seen in\u00a0May 2021,\u00a0used the fake tax-filing\u00a0theme.\u00a0With this discovery, the McAfee Mobile Research team has been able to update\u00a0McAfee Mobile Security\u00a0so that it\u00a0detects\u00a0this threat\u00a0as Android\/Elibomi\u00a0and\u00a0alerts\u00a0mobile users if this malware is present in their devices.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">During our investigation, we found that in the latest campaign the malware is delivered using an SMS text phishing attack. The SMS message pretends to be from the Income Tax Department in India and uses the name of the targeted user to make the SMS phishing attack more credible and increase the chances of infecting the device. The fake app used in this campaign is designed to capture and steal the victim\u2019s sensitive personal and financial information by tricking the user into believing that it is a legitimate tax-filing app.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">We\u00a0also found that\u00a0Elibomi\u00a0exposes\u00a0the\u00a0stolen\u00a0sensitive information to anyone on the Internet. The stolen data includes\u00a0e-mail\u00a0addresses, phone numbers,\u00a0SMS\/MMS messages\u00a0among other\u00a0financial and personal identifiable information.\u00a0McAfee has\u00a0reported the\u00a0servers exposing the data and at the time of\u00a0publication of this blog\u00a0the\u00a0exposed\u00a0information\u00a0is\u00a0no longer available.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2><span data-contrast=\"none\">Pretending to be an app from the\u00a0Income Tax Department\u00a0in\u00a0India<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">The latest and most recent Elibomi campaign uses a fake tax-filing app theme and pretends to be from the Income Tax Department from the Indian government. They even use the original logo to trick the users into installing the app. The package names (unique app identifiers) of these fake apps consist of a random word + another random string + imobile (e.g. \u201cdirect.uujgiq.imobile\u201d and \u201colayan.aznohomqlq.imobile\u201d). As mentioned before this campaign has been active since at least May 2021.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">After\u00a0all the required permissions are\u00a0granted,\u00a0Elibomi\u00a0attempts to collect\u00a0personal\u00a0information like\u00a0e-mail\u00a0address,\u00a0phone number and SMS\/MMS messages\u00a0stored in the infected\u00a0device:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2><span data-contrast=\"none\">Prevention and defense<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Here are our recommendations to avoid being affected by this and other Android threats that use social engineering to convince users to install malware disguised as legitimate apps:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Have a reliable and updated security application like McAfee Mobile Security installed in your mobile devices to protect you against this and other malicious applications.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Do not click on suspicious links received from text messages or social media, particularly from unknown sources. Always double check by other means if a contact that sends a link without context was really sent by that person because it could lead to the download of a malicious application.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<h2><span data-contrast=\"none\">Conclusion<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Android\/Elibomi\u00a0is just another example of\u00a0the effectiveness of personalized phishing attacks to trick users into installing a malicious application even when Android itself prevents that from happening. By pretending to be an \u201cIncome Tax\u201d app from the Indian government, Android\/Elibomi\u00a0has been able to gather very sensitive and private personal and financial information from affected users which could be used to perform identify and\/or financial fraud. Even more worryingly, the information was not only in cybercriminals&#8217;\u00a0hands,\u00a0but it was also unexpectedly exposed on the Internet which could have a greater impact\u00a0on\u00a0the victims. As long as social engineering attacks remain\u00a0effective,\u00a0we expect that cybercriminals will continue to evolve their campaigns to trick even more users with different fake apps including ones related\u00a0to financial and tax services.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">McAfee Mobile Security detects this threat as Android\/Elibomi\u00a0and alerts mobile users if it is present. For more information about McAfee Mobile Security, visit\u00a0<\/span><a href=\"https:\/\/www.mcafeemobilesecurity.com\/\"><span data-contrast=\"auto\">https:\/\/www.mcafeemobilesecurity.com<\/span><\/a><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">For those interested in a deeper dive into our research&#8230;<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2><span data-contrast=\"none\">Distribution method\u00a0and stolen data\u00a0exposed on the Internet<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">During our investigation, we found the main distribution method of the latest campaign in one of the stolen SMS messages exposed in one of the C2 servers. The SMS body field in the screenshot below shows the Smishing attack used to deliver the malware. Interestingly, the message includes the victim\u2019s name in order to make the message more personal and therefore more credible. It also urges the user to click on a suspicious link with the excuse of checking an urgent update regarding the victim\u2019s Income Tax return:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Elibomi not only exposes stolen SMS messages, but it also captures and exposes the list of all accounts logged in the infected devices:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">If the targeted user clicks on\u00a0the link in the text message,\u00a0a phishing page\u00a0will be shown pretending to be from the Income Tax Department from the Indian government\u00a0which\u00a0addresses the user by its name to make the phishing attack more credible:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Each\u00a0targeted user\u00a0has a different\u00a0application.\u00a0For\u00a0example\u00a0in the screenshot below we have the app\u00a0\u201ccisco.uemoveqlg.imobile\u201d\u00a0on the left and\u00a0\u201ckomatsu.mjeqls.imobile\u201d\u00a0on the right:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">Figure\u00a0<\/span><\/i><i><span data-contrast=\"none\">6<\/span><\/i><i><span data-contrast=\"none\">. Different malicious applications for different users<\/span><\/i><\/p>\n<p><span data-contrast=\"auto\">During our investigation, we found that there are several variants of Elibomi for the same iMobile fake Income tax app. For example, some iMobile apps only have the login page while in others have the option to \u201cregister\u201d and request a fake tax refund:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">Figure\u00a0<\/span><\/i><i><span data-contrast=\"none\">7<\/span><\/i><i><span data-contrast=\"none\">. Fake\u00a0iMobile\u00a0screens designed to capture personal and financial information<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The\u00a0sensitive financial\u00a0information provided by the\u00a0tricked user\u00a0is also exposed\u00a0on the Internet:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">Figure\u00a0<\/span><\/i><i><span data-contrast=\"none\">8<\/span><\/i><i><span data-contrast=\"none\">.\u00a0Example of exposed financial information stolen by Elibomi using a fake tax filling app<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2><span data-contrast=\"none\">Related\u00a0Fake\u00a0IT Certificate\u00a0applications<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">The first\u00a0Elibomi\u00a0campaign pretended to be a fake \u201cIT Certificate\u201d app\u00a0was found to be\u00a0distributed\u00a0in\u00a0November 2020.\u00a0\u00a0In the following figure we can see the similarities in the code between the two malware campaigns:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">Figure\u00a0<\/span><\/i><i><span data-contrast=\"none\">9<\/span><\/i><i><span data-contrast=\"none\">. Code similarity between\u00a0Elibomi\u00a0campaigns<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The\u00a0malicious application\u00a0impersonated\u00a0an\u00a0IT certificate management module\u00a0that is\u00a0purposedly\u00a0used to\u00a0validate the\u00a0device\u00a0in a non-existent verification server.\u00a0Just like the most recent version of\u00a0Elibomi, this fake\u00a0ITCertificate\u00a0app requests\u00a0SMS permissions but it also requests\u00a0device administrator privileges, probably to\u00a0make more\u00a0difficult its removal.\u00a0The malicious application also\u00a0simulates a \u201cSecurity Scan\u201d\u00a0but in\u00a0reality\u00a0what it is doing in the background is stealing personal information like e-mail, phone number and SMS\/MMS messages stored in the infected device:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">Figure\u00a0<\/span><\/i><i><span data-contrast=\"none\">10<\/span><\/i><i><span data-contrast=\"none\">. Fake\u00a0ITCertificate\u00a0app pretending to do a security scan while it steals personal data in the background<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Just like with the\u00a0most recent \u201ciMobile\u201d\u00a0campaign, this fake \u201cITCertificate\u201d also exposes the stolen data\u00a0in one of the C2 servers. Here\u2019s an example of\u00a0a stolen SMS message that uses the same log fields\u00a0and structure\u00a0as the\u00a0\u201ciMobile\u201d campaign:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">Figure\u00a0<\/span><\/i><i><span data-contrast=\"none\">11<\/span><\/i><i><span data-contrast=\"none\">. SMS message is stolen by the fake &#8220;ITCertificate&#8221; using the same log structure as &#8220;iMobile&#8221;<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2><span data-contrast=\"none\">Interesting\u00a0string obfuscation technique<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">The cybercriminals behind these two pieces of malware designed a simple but interesting string obfuscation technique. All strings are decoded by calling different classes and each class has a completely different table value<\/span><\/p>\n<p><span data-contrast=\"auto\">The algorithm is a simple substitution cipher. For example, 35 is replaced with &#8216;h&#8217; and 80 is replaced with &#8216;t&#8217;\u00a0to obfuscate\u00a0the string.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2><span data-contrast=\"none\">Appendix \u2013\u00a0<\/span><span data-contrast=\"none\">Technical Data<\/span><span data-contrast=\"none\">\u00a0and\u00a0IOCs<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<table data-tablestyle=\"MsoTable15Grid1Light\" data-tablelook=\"1184\" aria-rowcount=\"16\">\n<tbody>\n<tr aria-rowindex=\"1\">\n<td colspan=\"2\" data-celllook=\"256\"><b><span data-contrast=\"auto\">Hash<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td colspan=\"2\" data-celllook=\"256\"><b><span data-contrast=\"auto\">Package name<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"2\">\n<td colspan=\"2\" data-celllook=\"0\"><b><span data-contrast=\"none\">1e8fba3c530c3cd7d72e208e25fbf704ad7699c0a6728ab1b290c645995ddd56<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td colspan=\"2\" data-celllook=\"0\"><span data-contrast=\"none\">direct.uujgiq.imobile<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"3\">\n<td colspan=\"2\" data-celllook=\"0\"><b><span data-contrast=\"none\">7f7b0555563e08e0763fe52f1790c86033dab8004aa540903782957d0116b87f<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td colspan=\"2\" data-celllook=\"0\"><span data-contrast=\"none\">ferrero.uabxzraglk.imobile<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"4\">\n<td colspan=\"2\" data-celllook=\"0\"><b><span data-contrast=\"none\">120a51611a02d1d8bd404bb426e07959ef79e808f1a55ce5bff33f04de1784ac<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td colspan=\"2\" data-celllook=\"0\"><span data-contrast=\"none\">erni.zbvbqlk.imobile<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"5\">\n<td colspan=\"2\" data-celllook=\"0\"><b><span data-contrast=\"none\">ecbd905c44b1519590df5465ea8acee9d3c155334b497fd86f6599b1c16345ef<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td colspan=\"2\" data-celllook=\"0\"><span data-contrast=\"none\">olayan.bxynrqlq.imobile<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"6\">\n<td colspan=\"2\" data-celllook=\"0\"><b><span data-contrast=\"none\">da900a00150fcd608a09dab8a8ccdcf33e9efc089269f9e0e6b3daadb9126231<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td colspan=\"2\" data-celllook=\"0\"><span data-contrast=\"none\">foundation.aznohomqlq.imobile<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"7\">\n<td colspan=\"2\" data-celllook=\"0\"><b><span data-contrast=\"none\">795425dfc701463f1b55da0fa4e7c9bb714f99fecf7b7cdb6f91303e50d1efc0<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td colspan=\"2\" data-celllook=\"0\"><span data-contrast=\"none\">fresenius.bowqpd.immobile<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"8\">\n<td colspan=\"2\" data-celllook=\"0\"><b><span data-contrast=\"none\">b41c9f27c49386e61d87e7fc429b930f5e01038d17ff3840d7a3598292c935d7<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td colspan=\"2\" data-celllook=\"0\"><span data-contrast=\"none\">cisco.uemoveqlg.immobile<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"9\">\n<td colspan=\"2\" data-celllook=\"0\"><b><span data-contrast=\"none\">8de8c8c95fecd0b1d7b1f352cbaf839cba1c3b847997c804dfa2d5e3c0c87dfe<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td colspan=\"2\" data-celllook=\"0\"><span data-contrast=\"none\">komatsu.mjeqls.imobile<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"10\">\n<td colspan=\"2\" data-celllook=\"0\"><b><span data-contrast=\"none\">ecbd905c44b1519590df5465ea8acee9d3c155334b497fd86f6599b1c16345ef<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td colspan=\"2\" data-celllook=\"0\"><span data-contrast=\"none\">olayan.bxynrqlq.imobile<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"11\">\n<td colspan=\"2\" data-celllook=\"0\"><b><span data-contrast=\"none\">326d81ba7a715a57ba7aa2398824b420fff84cda85c0dd143462300af4e0a37a<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td colspan=\"2\" data-celllook=\"0\"><span data-contrast=\"none\">alstom.zjeubopqf.certificate<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"12\">\n<td colspan=\"2\" data-celllook=\"0\"><b><span data-contrast=\"none\">154cfd0dbb7eb2a4f4e5193849d314fa70dcc3caebfb9ab11b4ee26e98cb08f7<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td colspan=\"2\" data-celllook=\"0\"><span data-contrast=\"none\">alstom.zjeubopqf.certificate<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"13\">\n<td colspan=\"2\" data-celllook=\"0\"><b><span data-contrast=\"none\">c59ecd344729dac99d9402609e248c80e10d39c4d4d712edef0df9ee460fbd7b<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td colspan=\"2\" data-celllook=\"0\"><span data-contrast=\"none\">alstom.zjeubopqf.certificate<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"14\">\n<td colspan=\"2\" data-celllook=\"0\"><b><span data-contrast=\"none\">16284cad1b5a36e2d2ea9f67f5c772af01b64d785f181fd31d2e2bec2d98ce98<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td colspan=\"2\" data-celllook=\"0\"><span data-contrast=\"none\">alstom.zjeubopqf.certificate<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"15\">\n<td colspan=\"2\" data-celllook=\"0\"><b><span data-contrast=\"none\">98fc0d5f914ae47b61bc7b54986295d86b502a9264d7f74739ca452fac65a179<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td colspan=\"2\" data-celllook=\"0\"><span data-contrast=\"none\">alstom.zjeubopqf.certificate<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"16\">\n<td data-celllook=\"0\"><b><span data-contrast=\"none\">32724a3d2a3543cc982c7632f40f9e831b16d3f88025348d9eda0d2dfbb75dfe<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td colspan=\"2\" data-celllook=\"0\"><span data-contrast=\"none\">computer.yvyjmbtlk.transferInstant<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authored by\u00a0ChanUng\u00a0Pak\u00a0\u00a0 McAfee\u2019s\u00a0Mobile\u00a0Research team\u00a0recently\u00a0found a new Android malware,\u00a0Elibomi,\u00a0targeting taxpayers in India. The malware\u00a0steals\u00a0sensitive financial and private information\u00a0via phishing by pretending&#8230;<\/p>\n","protected":false},"author":695,"featured_media":127267,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4136],"class_list":["post-127133","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Phishing\u00a0Android\u00a0Malware\u00a0Targets Taxpayers in\u00a0India | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Authored by\u00a0ChanUng\u00a0Pak\u00a0\u00a0 McAfee\u2019s\u00a0Mobile\u00a0Research team\u00a0recently\u00a0found a new Android malware,\u00a0Elibomi,\u00a0targeting taxpayers in India. The\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing\u00a0Android\u00a0Malware\u00a0Targets Taxpayers in\u00a0India | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Authored by\u00a0ChanUng\u00a0Pak\u00a0\u00a0 McAfee\u2019s\u00a0Mobile\u00a0Research team\u00a0recently\u00a0found a new Android malware,\u00a0Elibomi,\u00a0targeting taxpayers in India. The\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-android-malware-targets-taxpayers-in-india\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-03T18:33:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-04T04:34:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_MalwareIndia.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-android-malware-targets-taxpayers-in-india\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-android-malware-targets-taxpayers-in-india\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Phishing\u00a0Android\u00a0Malware\u00a0Targets Taxpayers in\u00a0India\",\"datePublished\":\"2021-09-03T18:33:11+00:00\",\"dateModified\":\"2025-06-04T04:34:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-android-malware-targets-taxpayers-in-india\/\"},\"wordCount\":1515,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-android-malware-targets-taxpayers-in-india\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_MalwareIndia.jpg\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-android-malware-targets-taxpayers-in-india\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-android-malware-targets-taxpayers-in-india\/\",\"name\":\"Phishing\u00a0Android\u00a0Malware\u00a0Targets Taxpayers in\u00a0India | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-android-malware-targets-taxpayers-in-india\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-android-malware-targets-taxpayers-in-india\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_MalwareIndia.jpg\",\"datePublished\":\"2021-09-03T18:33:11+00:00\",\"dateModified\":\"2025-06-04T04:34:55+00:00\",\"description\":\"Authored by\u00a0ChanUng\u00a0Pak\u00a0\u00a0 McAfee\u2019s\u00a0Mobile\u00a0Research team\u00a0recently\u00a0found a new Android malware,\u00a0Elibomi,\u00a0targeting taxpayers in India. The\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-android-malware-targets-taxpayers-in-india\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-android-malware-targets-taxpayers-in-india\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-android-malware-targets-taxpayers-in-india\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_MalwareIndia.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_MalwareIndia.jpg\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-android-malware-targets-taxpayers-in-india\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Phishing\u00a0Android\u00a0Malware\u00a0Targets Taxpayers in\u00a0India\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing\u00a0Android\u00a0Malware\u00a0Targets Taxpayers in\u00a0India | McAfee Blog","description":"Authored by\u00a0ChanUng\u00a0Pak\u00a0\u00a0 McAfee\u2019s\u00a0Mobile\u00a0Research team\u00a0recently\u00a0found a new Android malware,\u00a0Elibomi,\u00a0targeting taxpayers in India. The","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Phishing\u00a0Android\u00a0Malware\u00a0Targets Taxpayers in\u00a0India | McAfee Blog","og_description":"Authored by\u00a0ChanUng\u00a0Pak\u00a0\u00a0 McAfee\u2019s\u00a0Mobile\u00a0Research team\u00a0recently\u00a0found a new Android malware,\u00a0Elibomi,\u00a0targeting taxpayers in India. The","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-android-malware-targets-taxpayers-in-india\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2021-09-03T18:33:11+00:00","article_modified_time":"2025-06-04T04:34:55+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_MalwareIndia.jpg","type":"image\/jpeg"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-android-malware-targets-taxpayers-in-india\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-android-malware-targets-taxpayers-in-india\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Phishing\u00a0Android\u00a0Malware\u00a0Targets Taxpayers in\u00a0India","datePublished":"2021-09-03T18:33:11+00:00","dateModified":"2025-06-04T04:34:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-android-malware-targets-taxpayers-in-india\/"},"wordCount":1515,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-android-malware-targets-taxpayers-in-india\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_MalwareIndia.jpg","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-android-malware-targets-taxpayers-in-india\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-android-malware-targets-taxpayers-in-india\/","name":"Phishing\u00a0Android\u00a0Malware\u00a0Targets Taxpayers in\u00a0India | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-android-malware-targets-taxpayers-in-india\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-android-malware-targets-taxpayers-in-india\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_MalwareIndia.jpg","datePublished":"2021-09-03T18:33:11+00:00","dateModified":"2025-06-04T04:34:55+00:00","description":"Authored by\u00a0ChanUng\u00a0Pak\u00a0\u00a0 McAfee\u2019s\u00a0Mobile\u00a0Research team\u00a0recently\u00a0found a new Android malware,\u00a0Elibomi,\u00a0targeting taxpayers in India. The","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-android-malware-targets-taxpayers-in-india\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-android-malware-targets-taxpayers-in-india\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-android-malware-targets-taxpayers-in-india\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_MalwareIndia.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_MalwareIndia.jpg","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/phishing-android-malware-targets-taxpayers-in-india\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Phishing\u00a0Android\u00a0Malware\u00a0Targets Taxpayers in\u00a0India"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/127133","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=127133"}],"version-history":[{"count":4,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/127133\/revisions"}],"predecessor-version":[{"id":215042,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/127133\/revisions\/215042"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/127267"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=127133"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=127133"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=127133"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=127133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}