Close Menu
InfovistarInfovistar
  • AI & ML
  • Cybersecurity
  • Startup
  • Tech News
  • Insights
    • Web Development
    • AWS and Cloud
    • Blockchain and Cryptocurrency
    • Chatbots
    • Technology
    • DevOps
    • Resources
  • Courses
    • Machine Learning
      • Python Tutorial
      • TensorFlow Tutorial
      • OpenCV
    • DSA
      • Data Structures
    • Web Development
      • PHP Tutorial
      • CodeIgniter Tutorial
      • CodeIgniter 4 Tutorial
      • CodeIgniter 4 AJAX
      • JavaScript
    • Mobile Development
      • Android Tutorial
  • Tools
    • Beautifier
      • HTML Beautifier
      • JavaScript Beautifier
      • CSS Beautifier
    • Online Compilers
      • Python Compiler
      • Java Compiler
      • JavaScript Editor
      • PHP Compiler
      • C++ Compiler
      • C Compiler
    • Image Optimization
      • Image Compressor
      • JPEG to PNG
      • PNG to JPEG
      • WebP to PNG

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Ransomware 2.0: How AI Is Changing Cyber Attacks Forever

April 18, 2025

Lovable AI Faces Major Threat from VibeScamming Attacks

April 10, 2025

Top Trends to Include in Your Strategy for Digital Marketing in 2025

April 5, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram Pinterest Vimeo
InfovistarInfovistar
  • AI & ML
  • Cybersecurity
  • Startup
  • Tech News
  • Insights
    • Web Development
    • AWS and Cloud
    • Blockchain and Cryptocurrency
    • Chatbots
    • Technology
    • DevOps
    • Resources
  • Courses
    • Machine Learning
      • Python Tutorial
      • TensorFlow Tutorial
      • OpenCV
    • DSA
      • Data Structures
    • Web Development
      • PHP Tutorial
      • CodeIgniter Tutorial
      • CodeIgniter 4 Tutorial
      • CodeIgniter 4 AJAX
      • JavaScript
    • Mobile Development
      • Android Tutorial
  • Tools
    • Beautifier
      • HTML Beautifier
      • JavaScript Beautifier
      • CSS Beautifier
    • Online Compilers
      • Python Compiler
      • Java Compiler
      • JavaScript Editor
      • PHP Compiler
      • C++ Compiler
      • C Compiler
    • Image Optimization
      • Image Compressor
      • JPEG to PNG
      • PNG to JPEG
      • WebP to PNG
Subscribe
InfovistarInfovistar
Home » Android Malware Disables Biometric Features, Puts Your PINs at Risk
Cybersecurity

Android Malware Disables Biometric Features, Puts Your PINs at Risk

InfovistarBy InfovistarDecember 25, 2023Updated:December 15, 2024No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Android Malware Disables Biometric Features, Puts Your PINs at Risk
Share
Facebook Twitter LinkedIn Pinterest Email

Have you ever wondered how hackers can bypass your biometric security, such as fingerprint or face unlock, to access your phone and steal your data? Well, there is a new Android malware that can do just that. It is called Chameleon, and it is a banking trojan that disguises itself as a legitimate app.

Cybersecurity researchers have issued a warning about a shapeshifting Android malware named Chameleon Trojan that bypasses security measures to steal users’ PINs and passwords.

In Short

  • The Android malware can trick users into enabling accessibility services to steal information.
  • It can bypass biometric settings.
  • Users are advised to avoid downloading APKs.

Chameleon was first discovered in April 2023, and it targeted users in Australia and Poland. It was distributed via the Zombinder service, a darknet platform that binds malware to popular apps. The malware would ask users to permit it to use the Accessibility service, which normally prevents dangerous apps from accessing sensitive features. Once granted, the malware would use the Accessibility service to disable biometric operations on the device, such as fingerprint or face unlock. Then, it would ask users to enter their PIN or password to unlock their device.

How does this android malware work?

The malware would then monitor the user’s inputs and recognize which code is in use. It would then schedule tasks and steal sensitive data from the device, such as login credentials, bank details, messages, contacts, photos, and more. The malware was also undetectable by Google Play Protect and anti-virus products running on the infected device.

The latest version of Chameleon has emerged with new capabilities and expanded its targeting area. It now poses as the Google Chrome app for Android 13 and later versions. It uses an HTML page trick to bypass the Restricted setting on these versions of Android. This setting blocks the approval of dangerous permissions like Accessibility for apps that are not verified by Google Play Protect.

The new version of Chameleon also uses a method to interrupt biometric operations on the device like fingerprint and face unlock. This uses the Accessibility service to disrupt PIN or password authentication. The malware can also display an HTML page on devices running Android 13 or later that guides users through a manual process to enable Accessibility for the app. This bypasses the system’s protection.

What are the risks?

The risks associated with Chameleon malware are severe and multifaceted.

  • Financial theft: It can steal your bank details, jeopardizing your sensitive banking information and leading to severe financial consequences.
  • Unauthorized access: With the help of stolen passwords and PINs, Chameleon can gain unrestricted access to your devices. Essentially, this allows malicious actors to control your digital devices, thereby enabling unauthorized transactions and data theft.
  • Privacy breach: Personal messages, app usage, and online activities are all exposed when there is a privacy theft. Chameleon can monitor and steal this information, leaving you vulnerable to identity theft and other cybercrime.

How to protect yourself from Android Malware?

Chameleon is a serious threat to Android users who rely on biometric security for their devices. It can easily take over their devices without them noticing and steal their valuable data. To protect yourself from this malware, you should avoid installing apps from unknown sources or third-party platforms like Zombinder. You should also keep your device updated with the latest security patches and use Google Play Protect regularly. You should also enable biometric security on your device if possible and avoid entering your PIN or password when prompted by suspicious apps.

If you suspect that your device is infected by Chameleon or any other malware, you should scan it with a reputable anti-virus app immediately and remove any suspicious apps from your device. You should also change your passwords for any online accounts that may have been compromised by the malware.

Chameleon is one of many examples of how cybercriminals are constantly evolving their techniques to exploit vulnerabilities in Android devices and apps. As an Android user, you should always be vigilant and cautious about what you download and install on your device.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMaximizing SEO Potential: Why Google Recommends for a Hierarchical Site Structure
Next Article IT Firms in India Are at Risk from Ransomware Attacks
Infovistar
  • Website
  • Facebook
  • X (Twitter)
  • Instagram
  • LinkedIn

Related Posts

Cybersecurity

Ransomware 2.0: How AI Is Changing Cyber Attacks Forever

April 18, 2025
Cybersecurity

Lovable AI Faces Major Threat from VibeScamming Attacks

April 10, 2025
Cybersecurity

Hackers Target Mac Users with Apple ID Phishing Scam

March 28, 2025
Add A Comment

Comments are closed.

Blog Categories
  • AI and ML (93)
  • Android (4)
  • AWS and Cloud (7)
  • Blockchain and Cryptocurrency (6)
  • Case Study (7)
  • Chatbots (5)
  • Cybersecurity (71)
  • DevOps (5)
  • Object-Oriented Programming (2)
  • Payment Gateway (4)
  • Resources (5)
  • Search Engine Optimization (3)
  • Startup (34)
  • Tech News (70)
  • Tech Tips (12)
  • Technology (79)
  • Trading (6)
  • Web Development (23)
Top Posts

Google is rolling out Identity Check Feature to Android 15

January 25, 20252,370 Views

How to Integrate Google Gemini to WhatsApp

February 16, 20241,639 Views

OpenAI Unveils Web-Based AI Agent Operator for Task Automation

January 24, 20251,502 Views
Stay In Touch
  • Facebook
  • YouTube
  • WhatsApp
  • Twitter
  • Instagram
  • Pinterest
  • LinkedIn
Latest Articles

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

Most Popular

Google is rolling out Identity Check Feature to Android 15

January 25, 20252,370 Views

How to Integrate Google Gemini to WhatsApp

February 16, 20241,639 Views

OpenAI Unveils Web-Based AI Agent Operator for Task Automation

January 24, 20251,502 Views
Our Picks

Ransomware 2.0: How AI Is Changing Cyber Attacks Forever

April 18, 2025

Lovable AI Faces Major Threat from VibeScamming Attacks

April 10, 2025

Top Trends to Include in Your Strategy for Digital Marketing in 2025

April 5, 2025

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

Facebook X (Twitter) Instagram Pinterest
  • About Us
  • Contact Us
  • Tools
  • Terms & Conditions
  • Privacy Policy
  • AdSense Disclaimer
© 2025 Infovistar. Designed and Developed by Infovistar.

Type above and press Enter to search. Press Esc to cancel.

Go to mobile version