About: FluBot     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : owl:Thing, within Data Space : dbpedia.demo.openlinksw.com associated with source document(s)
QRcode icon
http://dbpedia.demo.openlinksw.com/describe/?url=http%3A%2F%2Fdbpedia.org%2Fresource%2FFluBot&invfp=IFP_OFF&sas=SAME_AS_OFF

FluBot is a sophisticated SMS computer virus –specifically a banking Trojan– of global reach which aims to steal private data from Android smart phones. Unlike much malware, FluBot has proven exceptionally durable, coming in waves or "campaigns" with each redesign. It masquerades as innocuous messages such as missed calls and deliveries, asking the receiver to click links that download spyware. A variant, TeaBot, has infiltrated official app stores, including Google Play Store, in the guise of a QR-code reader.

AttributesValues
rdf:type
rdfs:label
  • FluBot (en)
rdfs:comment
  • FluBot is a sophisticated SMS computer virus –specifically a banking Trojan– of global reach which aims to steal private data from Android smart phones. Unlike much malware, FluBot has proven exceptionally durable, coming in waves or "campaigns" with each redesign. It masquerades as innocuous messages such as missed calls and deliveries, asking the receiver to click links that download spyware. A variant, TeaBot, has infiltrated official app stores, including Google Play Store, in the guise of a QR-code reader. (en)
dcterms:subject
Wikipage page ID
Wikipage revision ID
Link from a Wikipage to another Wikipage
sameAs
dbp:wikiPageUsesTemplate
has abstract
  • FluBot is a sophisticated SMS computer virus –specifically a banking Trojan– of global reach which aims to steal private data from Android smart phones. Unlike much malware, FluBot has proven exceptionally durable, coming in waves or "campaigns" with each redesign. It masquerades as innocuous messages such as missed calls and deliveries, asking the receiver to click links that download spyware. A variant, TeaBot, has infiltrated official app stores, including Google Play Store, in the guise of a QR-code reader. 16,000 reports of FluBot were reported to the Australian Competition & Consumer Commission's Scamwatch in Australia across eight weeks in 2021. Although coverage of FluBot primarily centres on Australia and New Zealand, the scam has also targeted European countries such as Germany and Poland in 2022 campaigns. In May 2022, FluBot infrastructure was taken down in an operation involving 11 countries and it is not expected to resurge. (en)
prov:wasDerivedFrom
page length (characters) of wiki page
foaf:isPrimaryTopicOf
is foaf:primaryTopic of
Faceted Search & Find service v1.17_git139 as of Feb 29 2024


Alternative Linked Data Documents: ODE     Content Formats:   [cxml] [csv]     RDF   [text] [turtle] [ld+json] [rdf+json] [rdf+xml]     ODATA   [atom+xml] [odata+json]     Microdata   [microdata+json] [html]    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 08.03.3330 as of Mar 19 2024, on Linux (x86_64-generic-linux-glibc212), Single-Server Edition (378 GB total memory, 58 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2024 OpenLink Software