{"id":128869,"date":"2021-09-13T05:27:31","date_gmt":"2021-09-13T12:27:31","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=128869"},"modified":"2025-05-27T20:50:33","modified_gmt":"2025-05-28T03:50:33","slug":"android-malware-distributed-in-mexico-uses-covid-19-to-steal-financial-credentials","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-distributed-in-mexico-uses-covid-19-to-steal-financial-credentials\/","title":{"rendered":"Android malware distributed in Mexico uses Covid-19 to steal financial credentials"},"content":{"rendered":"<p>Authored by Fernando Ruiz<\/p>\n<p><span data-contrast=\"auto\">McAfee Mobile Malware Research Team has identified\u00a0malware\u00a0targeting Mexico. It\u00a0poses\u00a0as a security banking tool\u00a0or as a bank application designed to report an out-of-service ATM.\u00a0In both instances, the malware relies on the sense of urgency created by\u00a0tools designed to prevent fraud to encourage targets to use them.\u00a0This malware can steal\u00a0authentication factors\u00a0crucial to accessing accounts\u00a0from their victims on the targeted financial institutions\u00a0in Mexico.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">McAfee Mobile Security is\u00a0identifying\u00a0this threat as\u00a0Android\/Banker.BT\u00a0along with\u00a0its\u00a0variants.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"3\"><span data-contrast=\"none\">How does this malware spread?<\/span><span data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:40,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">The malware is distributed by a malicious phishing page that provides\u00a0actual banking security tips (copied from the original bank site)\u00a0and\u00a0recommends downloading\u00a0the malicious\u00a0apps as a security tool or as\u00a0an app to report\u00a0out-of-service ATM. It\u2019s very likely that a smishing campaign is associated with this threat as part of the distribution method or it\u2019s also possible that victims may be contacted directly by\u00a0scam\u00a0phone calls made by the criminals, a common occurrence in Latin America.\u00a0Fortunately,\u00a0this threat has not been identified on Google Play\u00a0yet.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Here\u2019s how to protect yourself<\/span><span data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:40,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">During the pandemic,\u00a0banks adopted\u00a0new ways to interact with their clients.\u00a0These rapid changes meant customers were\u00a0more willing to accept new procedures and to install new apps as part of the \u2018new normal\u2019 to interact remotely. Seeing\u00a0this,\u00a0cyber-criminals\u00a0introduced\u00a0new scams and phishing attacks that\u00a0looked\u00a0more credible than\u00a0those\u00a0in the\u00a0past\u00a0leaving customers more susceptible.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Fortunately,\u00a0McAfee Mobile Security\u00a0is able to\u00a0detect this new\u00a0threat as Android\/Banker.BT. To protect yourself\u00a0from this and similar threats:<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Employ security software on your mobile devices\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Think twice before downloading and installing suspicious apps especially if they request SMS or Notification listener permissions.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Use official app\u00a0stores\u00a0however\u00a0never trust them blindly\u00a0as\u00a0malware may be distributed on\u00a0these\u00a0stores too so check for permissions,\u00a0read reviews and seek out\u00a0developer information if available.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Use\u00a0token based second authentication factor apps (hardware or software) over SMS message\u00a0authentication<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true}\">\u00a0<\/span><\/li>\n<\/ul>\n<p aria-level=\"2\"><span data-contrast=\"none\">Interested in the details? Here\u2019s a deep dive on this malware<\/span><span data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:40,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"3\"><span data-contrast=\"none\">Behavior:\u00a0Carefully guiding the victim to provide their credentials<\/span><span data-ccp-props=\"{&quot;335559738&quot;:40}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Once the malicious app is installed and started, the first activity shows a message in Spanish that explains the fake purpose of the app:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">&#8211; Fake Tool to report fraudulent movements that creates a sense of urgency:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\u201cThe \u2018bank name has created a tool to allow you to block any suspicious movement. All operations listed on the app are still pending. If you fail to block the unrecognized movements in less than 24 hours, then they will charge your account automatically.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">At the end of the blocking\u00a0process,\u00a0you will receive an SMS message with the details of the blocked operations.\u201d<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">&#8211; In the case of the Fake ATM failure tool to request a new credit card under the pandemic context, there is a similar text that lures users into a false sense of security:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\u201cAs a Covid-19 sanitary measure, this new option has been created. You will receive an ID via SMS for your report and then you can request your new card at any branch or receive it at your registered home address for free. Alert! We will never request your sensitive data such as NIP or CVV.\u201dThis gives credibility to the app since it\u2019s saying it will not ask for some sensitive data; however, it will ask for web banking credentials.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">If the victims tap on \u201cIngresar\u201d (\u201caccess\u201d) then the banking trojan asks for SMS permissions and launch activity to enter the user id or account number and then the password. In the background, the password or \u2018clave\u2019 is transmitted to the criminal\u2019s server without verifying if the provided credentials are valid or being redirected to the original bank site as many others banking trojan does.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span class=\"TextRun SCXW197360466 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW197360466 BCX0\">Finally,<\/span><span class=\"NormalTextRun SCXW197360466 BCX0\"> a fixed fake list of transactions is displayed so the user can take the action of blocking them as part of the scam however at this point the crooks already have the victim\u2019s login data and access to their device SMS messages so they are capable to steal the second authentication factor.<\/span><\/span><span class=\"EOP SCXW197360466 BCX0\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span class=\"TextRun SCXW167750705 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW167750705 BCX0\">In case of the fake tool app to request a new\u00a0<\/span><span class=\"NormalTextRun SCXW167750705 BCX0\">card,<\/span><span class=\"NormalTextRun SCXW167750705 BCX0\">\u00a0the app shows a message that says at the end \u201cWe have created this Covid-19 sanitary measure and we invite you to visit our anti-fraud tips where you will learn how to protect your account\u201d.\u00a0<\/span><\/span><span class=\"EOP SCXW167750705 BCX0\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span class=\"TextRun SCXW138307403 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW138307403 BCX0\">In the background the malware contacts the\u00a0<\/span><span class=\"NormalTextRun SCXW138307403 BCX0\">command-and-control<\/span><span class=\"NormalTextRun SCXW138307403 BCX0\">\u00a0server that is hosted in the same domain used for distribution and it sends the user credentials and all users\u00a0<\/span><span class=\"NormalTextRun SCXW138307403 BCX0\">SMS<\/span><span class=\"NormalTextRun SCXW138307403 BCX0\"> messages over HTTPS as query parameters (as part of the URL) which can lead to the sensitive data to be stored in web server logs and not only the final attacker destination.\u00a0<\/span><span class=\"NormalTextRun SCXW138307403 BCX0\">Usually,<\/span><span class=\"NormalTextRun SCXW138307403 BCX0\"> malware of this type has\u00a0<\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2 SCXW138307403 BCX0\">poor<\/span><span class=\"NormalTextRun SCXW138307403 BCX0\"> handling of the stolen data, therefore, it\u2019s not surprising if this information is leaked or compromised by\u00a0<\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2 SCXW138307403 BCX0\">other<\/span><span class=\"NormalTextRun SCXW138307403 BCX0\">\u00a0criminal groups which makes this type of\u00a0<\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2 SCXW138307403 BCX0\">threat<\/span><span class=\"NormalTextRun SCXW138307403 BCX0\"> even riskier for the victims.<\/span><span class=\"NormalTextRun SCXW138307403 BCX0\">\u00a0<\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2 SCXW138307403 BCX0\">Actually,<\/span><span class=\"NormalTextRun SCXW138307403 BCX0\">\u00a0in figure 8 there is a partial screenshot of an exposed page that contains\u00a0<\/span><span class=\"NormalTextRun SCXW138307403 BCX0\">the structure to display the stolen data.<\/span><\/span><span class=\"EOP SCXW138307403 BCX0\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW70705226 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW70705226 BCX0\" data-ccp-parastyle=\"caption\">Table Headers: Date, From, Body Message, User, Password, Id:<\/span><\/span><span class=\"EOP SCXW70705226 BCX0\" data-ccp-props=\"{&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559738&quot;:120,&quot;335559739&quot;:120}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This mobile banker is interesting due it\u2019s a scam developed from scratch that is not linked to well-known and more powerful banking trojan frameworks that are commercialized in the black market between cyber-criminals. This is clearly a local development that may evolve in the future in a more serious threat since the decompiled code shows accessibility services class is present but not implemented which leads to thinking that the malware authors are trying to emulate the malicious behavior of more mature malware families. From the self-evasion perspective, the malware does not offer any technique to avoid analysis, detection, or decompiling that is signal it\u2019s in an early stage of development.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h4 aria-level=\"3\"><span data-contrast=\"none\">IoC<\/span><span data-ccp-props=\"{&quot;335559738&quot;:40}\">\u00a0<\/span><\/h4>\n<p><span data-contrast=\"auto\">SHA256:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">84df7daec93348f66608d6fe2ce262b7130520846da302240665b3b63b9464f9<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">b946bc9647ccc3e5cfd88ab41887e58dc40850a6907df6bb81d18ef0cb340997<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">3f773e93991c0a4dd3b8af17f653a62f167ebad218ad962b9a4780cb99b1b7e2<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">1deedb90ff3756996f14ddf93800cd8c41a927c36ac15fcd186f8952ffd07ee0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true}\">\u00a0<\/span><\/li>\n<\/ul>\n<h2><span data-contrast=\"auto\">Domains:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/h2>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">https[:\/\/]appmx2021.com<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true}\">\u00a0<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Authored by Fernando Ruiz McAfee Mobile Malware Research Team has identified\u00a0malware\u00a0targeting Mexico. It\u00a0poses\u00a0as a security banking tool\u00a0or as a bank&#8230;<\/p>\n","protected":false},"author":695,"featured_media":128899,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[7789],"coauthors":[4136],"class_list":["post-128869","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs","tag-android-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Android malware distributed in Mexico uses Covid-19 to steal financial credentials | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Authored by Fernando Ruiz McAfee Mobile Malware Research Team has identified\u00a0malware\u00a0targeting Mexico. It\u00a0poses\u00a0as a security banking tool\u00a0or as a bank\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Android malware distributed in Mexico uses Covid-19 to steal financial credentials | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Authored by Fernando Ruiz McAfee Mobile Malware Research Team has identified\u00a0malware\u00a0targeting Mexico. It\u00a0poses\u00a0as a security banking tool\u00a0or as a bank\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-distributed-in-mexico-uses-covid-19-to-steal-financial-credentials\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-13T12:27:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-28T03:50:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_MalwareMexico.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-distributed-in-mexico-uses-covid-19-to-steal-financial-credentials\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-distributed-in-mexico-uses-covid-19-to-steal-financial-credentials\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Android malware distributed in Mexico uses Covid-19 to steal financial credentials\",\"datePublished\":\"2021-09-13T12:27:31+00:00\",\"dateModified\":\"2025-05-28T03:50:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-distributed-in-mexico-uses-covid-19-to-steal-financial-credentials\/\"},\"wordCount\":1067,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-distributed-in-mexico-uses-covid-19-to-steal-financial-credentials\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_MalwareMexico.jpg\",\"keywords\":[\"android malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-distributed-in-mexico-uses-covid-19-to-steal-financial-credentials\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-distributed-in-mexico-uses-covid-19-to-steal-financial-credentials\/\",\"name\":\"Android malware distributed in Mexico uses Covid-19 to steal financial credentials | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-distributed-in-mexico-uses-covid-19-to-steal-financial-credentials\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-distributed-in-mexico-uses-covid-19-to-steal-financial-credentials\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_MalwareMexico.jpg\",\"datePublished\":\"2021-09-13T12:27:31+00:00\",\"dateModified\":\"2025-05-28T03:50:33+00:00\",\"description\":\"Authored by Fernando Ruiz McAfee Mobile Malware Research Team has identified\u00a0malware\u00a0targeting Mexico. It\u00a0poses\u00a0as a security banking tool\u00a0or as a bank\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-distributed-in-mexico-uses-covid-19-to-steal-financial-credentials\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-distributed-in-mexico-uses-covid-19-to-steal-financial-credentials\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-distributed-in-mexico-uses-covid-19-to-steal-financial-credentials\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_MalwareMexico.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_MalwareMexico.jpg\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-distributed-in-mexico-uses-covid-19-to-steal-financial-credentials\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Android malware distributed in Mexico uses Covid-19 to steal financial credentials\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Android malware distributed in Mexico uses Covid-19 to steal financial credentials | McAfee Blog","description":"Authored by Fernando Ruiz McAfee Mobile Malware Research Team has identified\u00a0malware\u00a0targeting Mexico. It\u00a0poses\u00a0as a security banking tool\u00a0or as a bank","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Android malware distributed in Mexico uses Covid-19 to steal financial credentials | McAfee Blog","og_description":"Authored by Fernando Ruiz McAfee Mobile Malware Research Team has identified\u00a0malware\u00a0targeting Mexico. It\u00a0poses\u00a0as a security banking tool\u00a0or as a bank","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-distributed-in-mexico-uses-covid-19-to-steal-financial-credentials\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2021-09-13T12:27:31+00:00","article_modified_time":"2025-05-28T03:50:33+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_MalwareMexico.jpg","type":"image\/jpeg"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-distributed-in-mexico-uses-covid-19-to-steal-financial-credentials\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-distributed-in-mexico-uses-covid-19-to-steal-financial-credentials\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Android malware distributed in Mexico uses Covid-19 to steal financial credentials","datePublished":"2021-09-13T12:27:31+00:00","dateModified":"2025-05-28T03:50:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-distributed-in-mexico-uses-covid-19-to-steal-financial-credentials\/"},"wordCount":1067,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-distributed-in-mexico-uses-covid-19-to-steal-financial-credentials\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_MalwareMexico.jpg","keywords":["android malware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-distributed-in-mexico-uses-covid-19-to-steal-financial-credentials\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-distributed-in-mexico-uses-covid-19-to-steal-financial-credentials\/","name":"Android malware distributed in Mexico uses Covid-19 to steal financial credentials | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-distributed-in-mexico-uses-covid-19-to-steal-financial-credentials\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-distributed-in-mexico-uses-covid-19-to-steal-financial-credentials\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_MalwareMexico.jpg","datePublished":"2021-09-13T12:27:31+00:00","dateModified":"2025-05-28T03:50:33+00:00","description":"Authored by Fernando Ruiz McAfee Mobile Malware Research Team has identified\u00a0malware\u00a0targeting Mexico. It\u00a0poses\u00a0as a security banking tool\u00a0or as a bank","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-distributed-in-mexico-uses-covid-19-to-steal-financial-credentials\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-distributed-in-mexico-uses-covid-19-to-steal-financial-credentials\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-distributed-in-mexico-uses-covid-19-to-steal-financial-credentials\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_MalwareMexico.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_MalwareMexico.jpg","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-distributed-in-mexico-uses-covid-19-to-steal-financial-credentials\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Android malware distributed in Mexico uses Covid-19 to steal financial credentials"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/128869","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=128869"}],"version-history":[{"count":4,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/128869\/revisions"}],"predecessor-version":[{"id":214523,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/128869\/revisions\/214523"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/128899"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=128869"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=128869"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=128869"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=128869"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}