{"id":216651,"date":"2025-08-04T05:24:34","date_gmt":"2025-08-04T12:24:34","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=216651"},"modified":"2025-08-04T13:07:21","modified_gmt":"2025-08-04T20:07:21","slug":"android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto\/","title":{"rendered":"Android Malware Targets Indian Banking Users to Steal Financial Info and Mine Crypto"},"content":{"rendered":"<p>Authored by Dexter Shin<\/p>\n<p>McAfee\u2019s Mobile Research Team discovered a new Android malware campaign targeting Hindi-speaking users, mainly in India. The malware impersonates popular Indian financial apps, including SBI Card, Axis Bank, and IndusInd Bank, and is distributed through phishing websites that are continuously being created. What makes this campaign unique is its dual-purpose design: it steals personal and financial information while also silently mining Monero cryptocurrency using <a href=\"https:\/\/github.com\/xmrig\/xmrig\">XMRig<\/a>, which is triggered via Firebase Cloud Messaging (FCM). It also abuses user trust by pretending to be a legitimate app update from Google Play.<\/p>\n<p>McAfee, as part of the App Defense Alliance committed to protecting users and the app ecosystem, reported the identified malicious apps to Google. As a result, Google blocked the associated FCM account to prevent further abuse. Also, McAfee Mobile Security detects all of these apps as High-Risk threats. For more information, visit <a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/mobile.html?path=blogs\">McAfee&#8217;s Mobile Security page<\/a>.<\/p>\n<p>This campaign targets Indian users by impersonating legitimate financial services to lure victims into installing a malicious app. This is not the first malware campaign targeting Indian users. In the past, McAfee has reported <a href=\"https:\/\/www.mcafee.com\/blogs\/?s=india&amp;topicsby=442\">other threats<\/a>. In this case, the attackers take it a step further by using real assets from official banking websites to build convincing phishing pages that host the malware payload. The app delivered through these phishing sites functions as a dropper, meaning it initially appears harmless but later dynamically loads and executes the actual malicious payload. This technique helps evade static detection and complicates analysis.<\/p>\n<p>Apart from delivering a malicious payload, the malware also mines cryptocurrency on infected mobile devices. When the malware receives specific commands via FCM, it silently initiates a background mining process for Monero (XMR). Monero is a privacy-focused cryptocurrency that hides transaction addresses, sender and receiver identities, and transaction amounts. Because of these privacy features, cybercriminals often use it to stay hidden and move illegal money without getting caught. Its mining algorithm, RandomX, is optimized for general-purpose CPUs, making it possible to mine Monero efficiently even on mobile devices.<\/p>\n<h2>Technical Findings<\/h2>\n<h3>Distribution Methods<\/h3>\n<p>The malware is distributed through phishing websites that impersonate Indian financial services. These sites are designed to closely resemble official banking sites and trick users into downloading a fake Android app. Here are some phishing sites we found during our investigation.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-216982\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Screenshot-2025-08-04-at-12.39.26\u202fPM.jpg\" alt=\"\" width=\"1043\" height=\"735\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Screenshot-2025-08-04-at-12.39.26\u202fPM.jpg 1920w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Screenshot-2025-08-04-at-12.39.26\u202fPM-300x211.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Screenshot-2025-08-04-at-12.39.26\u202fPM-1024x722.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Screenshot-2025-08-04-at-12.39.26\u202fPM-768x541.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Screenshot-2025-08-04-at-12.39.26\u202fPM-1536x1082.jpg 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Screenshot-2025-08-04-at-12.39.26\u202fPM-183x129.jpg 183w\" sizes=\"auto, (max-width: 1043px) 100vw, 1043px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 1<\/strong>. Screenshot of a phishing website<\/p>\n<p>&nbsp;<\/p>\n<p>These phishing pages load images, JavaScript, and other web resources directly from the official websites to appear legitimate. However, they include additional elements such as \u201cGet App\u201d or \u201cDownload\u201d buttons, which prompt users to install the malicious APK file.<\/p>\n<h2>Dropper Analysis<\/h2>\n<p>When the app is launched, the first screen the user sees looks like a Google Play Store page. It tells the user that they need to update the app.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-216998\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/2.png\" alt=\"\" width=\"876\" height=\"994\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/2.png 1692w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/2-264x300.png 264w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/2-902x1024.png 902w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/2-768x871.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/2-1354x1536.png 1354w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/2-114x129.png 114w\" sizes=\"auto, (max-width: 876px) 100vw, 876px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 2.<\/strong> The initial screen shown by the dropper app<\/p>\n<p>The app includes an encrypted DEX file stored in the assets folder. This file is not the actual malicious payload, but a loader component. When the app runs, it decrypts this file using XOR key and dynamically loads it into memory. The loaded DEX file contains custom code, including a method responsible for loading additional payloads.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-217013\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/3.png\" alt=\"\" width=\"1920\" height=\"378\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/3.png 1920w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/3-300x59.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/3-1024x202.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/3-768x151.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/3-1536x302.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/3-205x40.png 205w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 3<\/strong>. First-stage encrypted loader DEX and XOR key<\/p>\n<p>Once the first-stage DEX is loaded, the loader method inside it decrypts and loads a second encrypted file, which is also stored in the assets. This second file contains the final malicious payload. By splitting the loading process into two stages, the malware avoids exposing any clearly malicious code in the main APK and makes static analysis more difficult.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-217028\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/4.png\" alt=\"\" width=\"1944\" height=\"530\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/4.png 1944w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/4-300x82.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/4-1024x279.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/4-768x209.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/4-1536x419.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/4-205x56.png 205w\" sizes=\"auto, (max-width: 1944px) 100vw, 1944px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 4.<\/strong> Second-stage malicious payload loaded by Loader class<\/p>\n<p>Once this payload is loaded, the app displays a fake financial interface that looks like a real app. It prompts the user to input sensitive details such as their name, card number, CVV, and expiration date. The collected information is then sent to the attacker\u2019s command-and-control (C2) server. After submission, the app shows a fake card management page with messages like \u201cYou will receive email confirmation within 48 hours,\u201d giving the false impression that the process is ongoing. All features on the page are fake and do not perform any real function.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-217043\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Screenshot-2025-08-04-at-12.50.52\u202fPM.jpg\" alt=\"\" width=\"1024\" height=\"722\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Screenshot-2025-08-04-at-12.50.52\u202fPM.jpg 1920w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Screenshot-2025-08-04-at-12.50.52\u202fPM-300x212.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Screenshot-2025-08-04-at-12.50.52\u202fPM-1024x722.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Screenshot-2025-08-04-at-12.50.52\u202fPM-768x542.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Screenshot-2025-08-04-at-12.50.52\u202fPM-1536x1083.jpg 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Screenshot-2025-08-04-at-12.50.52\u202fPM-183x129.jpg 183w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 5.<\/strong> Fake card verification screen<\/p>\n<h2>Monero Mining Process<\/h2>\n<p>As mentioned earlier, one of this campaign&#8217;s key features is its hidden cryptomining functionality. The app includes a service that listens for specific FCM messages, which trigger for start of the mining process.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-217059\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/6.png\" alt=\"\" width=\"1052\" height=\"373\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/6.png 1380w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/6-300x107.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/6-1024x364.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/6-768x273.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/6-205x73.png 205w\" sizes=\"auto, (max-width: 1052px) 100vw, 1052px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 6.<\/strong> Firebase messaging service is declared in the manifest.<\/p>\n<p>&nbsp;<\/p>\n<p>In the second-stage dynamically loaded code, there is a routine that attempts to download a binary file from external sources. The malware contains 3 hardcoded URLs and tries to download the binary from all of them.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-217074\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/7.png\" alt=\"\" width=\"1061\" height=\"365\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/7.png 1714w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/7-300x103.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/7-1024x352.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/7-768x264.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/7-1536x529.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/7-205x71.png 205w\" sizes=\"auto, (max-width: 1061px) 100vw, 1061px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 7.<\/strong> Hardcoded URLs used by the malware to download a binary file<\/p>\n<p>&nbsp;<\/p>\n<p>The downloaded binary is encrypted and has a .so extension, which usually indicates a native library. However, instead of loading it normally, the malware uses ProcessBuilder, a Java class for running external processes, to directly execute the file like a standalone binary.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-217089\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/8.png\" alt=\"\" width=\"1035\" height=\"1060\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/8.png 1338w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/8-293x300.png 293w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/8-1000x1024.png 1000w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/8-768x786.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/8-126x129.png 126w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/8-24x24.png 24w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/8-48x48.png 48w\" sizes=\"auto, (max-width: 1035px) 100vw, 1035px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 8.<\/strong> Executing downloaded binary using ProcessBuilder<\/p>\n<p>What\u2019s particularly interesting is the way the binary is executed. The malware passes a set of arguments to the process that exactly match the command-line options used by XMRig, an open-source mining tool. These include specifying the mining pool server and setting the target coin to Monero.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-217104\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/9.png\" alt=\"\" width=\"1776\" height=\"190\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/9.png 1776w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/9-300x32.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/9-1024x110.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/9-768x82.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/9-1536x164.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/9-205x22.png 205w\" sizes=\"auto, (max-width: 1776px) 100vw, 1776px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 9.<\/strong> XMRig-compatible arguments passed to the mining process<\/p>\n<p>&nbsp;<\/p>\n<p>When the decrypted binary is executed, it displays log messages identical to those produced by XMRig. In summary, this malware is designed to mine Monero in the background on infected devices when it receives specific FCM messages.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-217119\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/10.png\" alt=\"\" width=\"1364\" height=\"192\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/10.png 1364w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/10-300x42.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/10-1024x144.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/10-768x108.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/10-205x29.png 205w\" sizes=\"auto, (max-width: 1364px) 100vw, 1364px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 10.<\/strong> Decrypted binary showing XMRig log messages<\/p>\n<h2>Recommendations and Conclusion<\/h2>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-217134\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/11.png\" alt=\"\" width=\"1034\" height=\"516\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/11.png 1034w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/11-300x150.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/11-1024x511.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/11-768x383.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/11-205x102.png 205w\" sizes=\"auto, (max-width: 1034px) 100vw, 1034px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 11.<\/strong> Geographic distribution of infected devices<\/p>\n<p>Telemetry shows that most infections are concentrated in India, which aligns with the campaign\u2019s use of Hindi language and impersonation of Indian financial apps. A small number of detections were also observed in other regions, but these appear to be limited.<\/p>\n<p>What makes this campaign notable is its dual-purpose design, combining financial data theft with background cryptomining, triggered remotely via Firebase Cloud Messaging (FCM). This technique allows the malware to remain dormant and undetected until it receives a specific command, making it harder for users and defenders to detect.<\/p>\n<p>To stay protected, users are strongly advised to download apps only from trusted sources such as Google Play, and to avoid clicking on links received through SMS, WhatsApp, or social media\u2014especially those promoting financial services. It is also important to be cautious when entering personal or banking information into unfamiliar apps. In addition, using a reliable mobile security solution that can detect malicious apps and block phishing websites can provide an added layer of protection against threats like this.<\/p>\n<h2>Indicators of Compromise (IOCs)<\/h2>\n<table data-tablestyle=\"MsoTableGrid\" data-tablelook=\"1184\" aria-rowcount=\"12\">\n<tbody>\n<tr aria-rowindex=\"1\">\n<td data-celllook=\"65536\"><span data-contrast=\"auto\">Type<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:1}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"auto\">Value<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:1}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"auto\">Description<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:1}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"2\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">APK<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;469777462&quot;:[1519],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">2c1025c92925fec9c500e4bf7b4e9580f9342d44e21a34a44c1bce435353216c<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">SBI Credit Card<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"3\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">APK<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">b01185e1fba96209c01f00728f6265414dfca58c92a66c3b4065a344f72768ce<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">ICICI Credit Card<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"4\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">APK<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">80c6435f859468e660a92fc44a2cd80c059c05801dae38b2478c5874429f12a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Axis Credit Card<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"5\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">APK<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">59c6a0431d25be7e952fcfb8bd00d3815d8b5341c4b4de54d8288149090dcd74<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">IndusInd Credit Card<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"6\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">APK<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">40bae6f2f736fcf03efdbe6243ff28c524dba602492b0dbb5fd280910a87282d<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Kotak Credit Card<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"7\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">URL<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">https[:\/\/]www.sbi.mycardcare.in<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Phishing Site<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"8\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">URL<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">https[:\/\/]kotak.mycardcard.in<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Phishing Site<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"9\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">URL<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">https[:\/\/]axis.mycardcare.in<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Phishing Site<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"10\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">URL<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">https[:\/\/]indusind.mycardcare.in<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Phishing Site<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"11\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">URL<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">https[:\/\/]icici.mycardcare.in<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Phishing Site<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"12\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Firebase<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">469967176169<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">FCM Account<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authored by Dexter Shin McAfee\u2019s Mobile Research Team discovered a new Android malware campaign targeting Hindi-speaking users, mainly in India&#8230;.<\/p>\n","protected":false},"author":695,"featured_media":217153,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4136],"class_list":["post-216651","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Android Malware Targets Indian Banking Users to Steal Financial Info and Mine Crypto | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Authored by Dexter Shin McAfee\u2019s Mobile Research Team discovered a new Android malware campaign targeting Hindi-speaking users, mainly in India. The\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Android Malware Targets Indian Banking Users to Steal Financial Info and Mine Crypto | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Authored by Dexter Shin McAfee\u2019s Mobile Research Team discovered a new Android malware campaign targeting Hindi-speaking users, mainly in India. The\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-04T12:24:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-04T20:07:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2388818593.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Android Malware Targets Indian Banking Users to Steal Financial Info and Mine Crypto\",\"datePublished\":\"2025-08-04T12:24:34+00:00\",\"dateModified\":\"2025-08-04T20:07:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto\/\"},\"wordCount\":1275,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2388818593.jpg\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto\/\",\"name\":\"Android Malware Targets Indian Banking Users to Steal Financial Info and Mine Crypto | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2388818593.jpg\",\"datePublished\":\"2025-08-04T12:24:34+00:00\",\"dateModified\":\"2025-08-04T20:07:21+00:00\",\"description\":\"Authored by Dexter Shin McAfee\u2019s Mobile Research Team discovered a new Android malware campaign targeting Hindi-speaking users, mainly in India. The\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2388818593.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2388818593.jpg\",\"width\":1000,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Android Malware Targets Indian Banking Users to Steal Financial Info and Mine Crypto\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Android Malware Targets Indian Banking Users to Steal Financial Info and Mine Crypto | McAfee Blog","description":"Authored by Dexter Shin McAfee\u2019s Mobile Research Team discovered a new Android malware campaign targeting Hindi-speaking users, mainly in India. The","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Android Malware Targets Indian Banking Users to Steal Financial Info and Mine Crypto | McAfee Blog","og_description":"Authored by Dexter Shin McAfee\u2019s Mobile Research Team discovered a new Android malware campaign targeting Hindi-speaking users, mainly in India. The","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2025-08-04T12:24:34+00:00","article_modified_time":"2025-08-04T20:07:21+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2388818593.jpg","type":"image\/jpeg"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Android Malware Targets Indian Banking Users to Steal Financial Info and Mine Crypto","datePublished":"2025-08-04T12:24:34+00:00","dateModified":"2025-08-04T20:07:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto\/"},"wordCount":1275,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2388818593.jpg","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto\/","name":"Android Malware Targets Indian Banking Users to Steal Financial Info and Mine Crypto | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2388818593.jpg","datePublished":"2025-08-04T12:24:34+00:00","dateModified":"2025-08-04T20:07:21+00:00","description":"Authored by Dexter Shin McAfee\u2019s Mobile Research Team discovered a new Android malware campaign targeting Hindi-speaking users, mainly in India. The","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2388818593.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2388818593.jpg","width":1000,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Android Malware Targets Indian Banking Users to Steal Financial Info and Mine Crypto"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/216651","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=216651"}],"version-history":[{"count":11,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/216651\/revisions"}],"predecessor-version":[{"id":217187,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/216651\/revisions\/217187"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/217153"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=216651"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=216651"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=216651"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=216651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}