Prata is malicious software Discover Recently (a few months ago) it attacks Android mobile devices. The security and privacy of our data has become more important in recent years. Our smartphones are filled with sensitive information like our schedules, appointments, photos, and bank accounts. All this data is one of the main targets of malware, which is developing and multiplying at an amazing speed.
BRATA, Malware and Its Variants
This remote access trojan is used to steal banking details and comes in different versions that bypass security protocols. Each of them has different risks.
Versions of this malware target users in Latin America, China, Spain, Italy, Poland, and the United Kingdom. They infect devices and hijack user data by committing fraud through unauthorized bank transfers.
BRATA 1st Edition has GPS access and a factory reset option. This feature can be disastrous as it may erase your data and settings from the smartphone.
Version B has the same access to these options and can also use page overlays to steal the security number of bank accounts registered on the device.
3rd C downloads and installs malware on your Android device through an app. This technique is used to avoid being detected by any antivirus software. BRATA is malware that is constantly being modified so that it is not easily detected by antivirus programs that use unorthodox techniques.
Your bank accounts are at risk
BRATA monitors bank accounts for permissions to access and/or retrieve private information displayed on the device screen through screenshots.
Among BRATA’s other functions is keylogger, through which it monitors the keystrokes of users when using their bank application.
Delete your data
The ability to reset your device to factory settings is recent and works in two cases. When the malware successfully completes a bank scam, the factory resets the device to gain time before the user becomes aware of it.
The second case in which a factory reset is triggered is if the app is installed in a virtual environment, the malware will try to bypass the dynamic scan by running this function.