The Chameleon Android banking trojan is once again in circulation, using new techniques to hijack devices by disabling fingerprint and face unlock features and stealing device PINs. It is distributed through the Zombinder service, which binds malware to legitimate Android apps, making them seem less suspicious, and mimics the Google Chrome Android app. The trojan bypasses Google Protect alerts and antivirus products, steals on-screen content, and forces victims to grant it additional permissions. Users are advised to avoid APKs from unofficial sources and enable Play Protect.
![](https://healsecurity.com/wp-content/uploads/2024/07/group-ibs-threat-intelligence-and-defence-centre-equip-undergraduates-with-sophisticated.jpg)
Group-IB’s Threat Intelligence and Defence Centre Equip Undergraduates with Sophisticated Cybersecurity Technologies to Boost Threat Analysis and Enhance Cyber Resilience for Campus Start-ups
Hey there from the heart of the San Francisco Bay Area! It’s an absolute pleasure to have you back again for our chat on some