• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Europol Confirms Takedown of SMS-based FluBot Spyware

You are here: Home / Cyber Security News / Europol Confirms Takedown of SMS-based FluBot Spyware

Europol’s European Cybercrime Centre (EC3) announced the execution of an worldwide law enforcement operation that included 11 nations around the world and resulted in the takedown of the so-termed “FluBot” Adware.

The complex achievement reportedly adopted an investigation involving regulation enforcement authorities of Australia, Belgium, Finland, Hungary, Ireland, Spain, Sweden, Switzerland, the Netherlands, and the United States and coordinated by EC3.

“With cases spreading across Europe and Australia, international law enforcement cooperation was central in having down the FluBot legal infrastructure,” said EC3.

Composing in a blog site put up, Europol said the process force’s steps have been prompted by the Android malware spreading aggressively by way of SMS, thieving passwords, on the internet banking details and other delicate info from infected smartphones throughout the globe.

Now, Europol verified FluBot’s infrastructure was successfully set underneath the command of legislation enforcement, following a May procedure by the Dutch Police, whose actions rendered the strain of malware inactive. 

For context, FluBot was very first found in the wild in December 2020, but only received traction in 2021, when it contaminated a considerable quantity of products around the planet, significantly in Finland and Spain

Much like TangleBot, FluBot hooked up itself to a device through text messages that requested Android buyers to click a hyperlink and install an software (ordinarily to observe a bundle shipping and delivery or hear to a faux voicemail concept).

As soon as mounted, the application would request for accessibility permissions, which ended up applied by destructive actors to steal banking app qualifications and cryptocurrency account aspects as properly as disable constructed-in security options.

Interpol reported the malware was significantly virulent as it instantly multiplicated by accessing an infected smartphone’s contacts and forwarding by itself to their products.

EC3 also spelled out that due to the fact FluBot malware was disguised as an software, it could be complicated to spot. 

“There are two methods to inform whether an app may possibly be malware: If you tap an app, and it does not open [and] If you try out to uninstall an app, and are instead proven an mistake information.”

Though the FluBot infrastructure is now reportedly under the control of Dutch police forces, Europol advisable to all Android users who feel they may well have accidentally put in FluBot to reset their phones to manufacturing unit configurations.

Some parts of this article are sourced from:
www.infosecurity-magazine.com

Previous Post: « Twitter will shut down the TweetDeck for Mac app on July 1st
Next Post: Focusrite Vocaster hands-on: Streamlined audio interfaces built for podcasters »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals

Copyright © 2025 · AllTech.News, All Rights Reserved.