What is Fakecalls?
In Korea, the Fakecalls banking Trojan began to spread. Fakecalls has unusual functionality. The Trojan intercepts calls to the technical support of the bank and connects the victim directly with the scammers. The malware disguises itself as one of the applications of a financial organization. At the same time, the official logo and the number by which you can get in touch with customer support are displayed. An attempt to call the bank will result in an interception. A custom dial screen will be displayed, it is very difficult to distinguish it from a legitimate one. Scammers pose as technical support staff. The “consultation” of the client leads to the loss of money. Fakecalls, when installed, requests a number of permissions to access the contact list, camera, microphone, geolocation data and smartphone functionality. You may follow this step-by-step guide to remove Fakecalls trojan from Android smartphones and tablets.
What actions can Fakecalls perform after obtaining the rights
As soon as the malware gets these rights, it will be able to execute commands and simulate touching the display. While for the owner of the device, these actions will be invisible. Moreover, it can perfom the following actions:
- Intercept and block app notifications;
- Set yourself as an SMS sending the application by default;
- Use USSD commands;
- Make phone calls;
- Steal contact lists;
- Show phishing screens on top of other apps.
The virus can also counteract its removal from the device.
What should I do to avoid getting infected with the Fakecalls virus?
Please note that your phone and personal data are safe until you download the app from the SMS link and install it. Even if you missed this moment, know that Fakecalls does not have full control over the device, unless the user himself gives access to the “Accessibility service” function. Keep this in mind when giving permissions to unfamiliar applications to enable this option.
With the growing number of mobile device users, the number of viruses has also increased. If earlier Trojans that change settings and infect other files (for example, Skulls for Symbian) were the most dangerous, then modern hacker developments are able to make the gadget stop turning on, deleting the information necessary for the OS. To avoid similar situations in the future:
- Prohibit installations from third-party sources in the settings. You will still be able to download games, movies, music, books, programs from the Play Market store, files in which are manually and automatically checked;
- Download the antivirus. Do not abuse this point – just one such application is enough, simultaneous use of several will cause the device to slow down;
- Check the permissions of the existing software, remove the checkboxes from the “Change system settings” item for services that do not belong to reliable publishers, such as Google.
Recommended Anti-malware tool:
Try Norton Mobile
Norton is a powerful removal tool. It can detect and remove all instances of newest viruses, pop-ups, ransomware or trojans.
Reset to Factory Settings
It will not be so easy to remove the application from the device. Definitely, it is necessary to reset the device to factory settings. Keep in mind that this will lead to the loss of personal data. Before performing the procedure, perform a backup.
- Start up your device in Recovery Mode using previous instruction
- Select the “Factory Reset” option, a notification will appear that it is impossible to reverse the changes;
- After completing the process, restart the phone by clicking on “Reboot“.