Svpeng
Posted: June 26, 2014
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Ranking: | 9,633 |
---|---|
Threat Level: | 1/10 |
Infected PCs: | 1,834 |
First Seen: | June 26, 2014 |
---|---|
Last Seen: | October 9, 2023 |
OS(es) Affected: | Windows |
Svpeng, or Trojan-Banker.AndroidOS.Svpeng.a, is a banking Trojan that may collect confidential login information, and may also include new functions intended to block your machine or encrypt files on its hard drive. Unlike the majority of ransomware and spyware malware researchers have examined, Svpeng targets personal computers and mobile smart phone devices. Because of the potential severity of the lockdown precipitated by this Russian Trojan, preemptive anti-malware solutions strongly are advised for blocking or deleting Svpeng from your phone.
The Transformation of a Trojan from East to West
For years, Svpeng already has had a lucrative career as a bank account details-collecting Trojan in Russia. However, recent updates to Svpeng's campaign have caused Svpeng to migrate to English-speaking countries, including the UK and United States, with new attacks. Besides all of the usual functions for gathering passwords, account names and other credentials that could be used to hack your bank account, Svpeng's Western variant also seems to be branching out into ransomware strategies.
Svpeng, which is designed to be compatible with Windows and Android-based devices, now may lock the affected device by displaying a fraudulent FBI warning of illegal activity. In this respect, malware experts found that Svpeng behaved similarly to most other fake Ransomware Trojans, and requested a MoneyPak cash transfer before the device, in theory, would be relinquished back to its user's control. However, the real benefit of paying Svpeng's ransom is dubious. Since Svpeng attempts to lock the entire device, rather than specific files, a compromised Android phone could become effectively unusable. Svpeng also shows some inclinations towards including file-encrypting attacks that could damage the files on your device, separately from any harm suffered by the operating system.
Keeping Svpeng from Pinging Your Phone
Svpeng now is a global threat, and displays how ordinary and quick it can be for a Trojan that's limited to one country to expand its operations to other nations with minimal alterations. With such invasive system lockdowns at stake, preventative security measures especially are stressed, the failure of which could allow Svpeng to block your phone permanently. 'Rooting' your phone, or granting the phone's user root-level administrative access, can provide some extra protection from Svpeng, but shouldn't substitute for real anti-malware protection.
Svpeng also is a case in point exemplifying the tendency of new financial threats to include multiple attacks in their payloads. Although you may tell that Svpeng's fake FBI warning is, in fact, a fake, Svpeng also may be riffling through any accessible bank account information, which may be put to use initiating cash transfers to the Svpeng's team. Always monitor your bank account routinely for unauthorized use, and be prepared to change passwords that have had any possibility of being compromised by Svpeng or other Trojans.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.