Friday, May 1, 2020

Doing Ethics Technique Android Banking Trojans

Questions: 1. What is going on?2. What are the facts?3. What are the issues? 4. Who is affected?5. What are the ethical issues and their implications?6. What could have been done about it?7. What are the options?8. Which option is the best and why? Answers: 1. The incident, which is considered here, was reported by the news website (Cimpanu, 2016). The news article titled as Android Banking Trojans Based on GM Bot Infected over 200,000 Users in the Past 3 Months was published on 5th November. The incident describes the experience of people who installs GM Bot v1 affected application. GM Bot is one of the banking Trojan which is created in the year 2014, and was released in Russia by one of the hacking forums (Cimpanu, 2016). The GM Bot v1 source code is leaked in the year 2016 by one of the clients of Ganjaman, who was the developer of the malware. A person named crooks uses GM Bot by packing the malware inside an application, which is disguised as flash fake player for various android devices. This app is distributed among the people but outside the Google play store because Google always provide a warning to alert the users for uninstalling the app, which is not verified effectively (Park Roo, 2013). Many people install the affected GM Bot in their mobile phones. This application uses a persons email id as well as password for logging into the application, which leads to hacking of personal as well as financial information of the users. 2. GM Bot is packed inside an app by disguising it as fake flash player for the android users. The people download the infected app, which constantly pester the users for their personal details. The reason of asking for the personal detail is to have power for overlaying fake login screen on the top of the application, which generally asks for personal as well as financial details of the users including banking details and many more (Manjula Shanmugan, 2016). The popularity of GM Bot with an additional feature has targeted large number of banks around the world. 3. The issues that are related with the malware is that, crook have packed it inside an application by disguising it. Since the popularity of GM Bot is high in the market, crook disguised the malware inside a fake flash player for various android devices. This increased the popularity of the malware more among the people (Moon Park, 2016). It is not available in the Goggle, as it may not allow it users to have access on the unauthorized application. The users install the application inside their phones, which raises number of issues. The application asks the users to provide their details for logging inside the application. The main reason for logging is to overlay the fake login screen, which stores the data, and information related with the banks and other personal information of the users (Sethi, 2015). This raises number of issues. The hacking of financial details including the details of the bank has affected large number of people all around the world. It also targeted large n umber of banks across different countries. 4. The issue that arises due to the android banking Trojans based on GM Bot have affected more than 200,000 users all over the world in the past 3 months. The legitimate app, which is created by Crook, captures financial information of the users (Salman, Saad Ali, 2013). The issue not only affected the people but it also targeted large number of banks all around the world. 5. There are number of ethical issues that arise due to the situation. The most important ethical issue that arises is that one of the clients of Ganjamans released the source code of GM Bot online for free. Crooks took the advantage of the situation and packed the malware by disguising it inside the fake flash player (Roberts Allen, 2015). People install the application and use their personal information for logging inside the application, which leads to several other ethical issues. The users log in to the account by providing their personal as well as financial information including the bank details (Klein et al., 2015). The various data and information of the users are stored inside the application, which is used further for hacking their bank account. The situation not only targeted common people but it also targeted large number of banks all over the world. 6.The developers of different applications must implement strict rules and regulations so that unverified apps could not enter the market. The people must also need to be aware in order to avoid downloading application from unauthorized websites. 7. There are number of options, which can be used in order to minimize or avoid the situation that has happened in Australia. The people all over the world must be aware before downloading or installing any type of app. They must verify the app properly about its different feature before downloading. Some rules and regulation must be made so that the developers cannot launch the unverified app in the website. The people must check the warning messages that are provided before installation off the application. It is also important to be careful before providing all the personal as well as financial information for logging inside an application. If these steps are followed by every individual then the issue that have aroused in Australia can be minimized or avoided fully. 8. The best option is that people must check as well as verify the application before installing them. This is because it reduces the chances of ethical issue by 50 percent. If the people are aware then the problem that has aroused in Australia may not happen again. References Cimpanu, C. (2016).Android Banking Trojans Based on GM Bot Infected Over 200,000 Users in the Past 3 Months.BleepingComputer. Retrieved 30 November 2016, from https://www.bleepingcomputer.com/news/security/android-banking-trojans-based-on-gm-bot-infected-over-200-000-users-in-the-past-3-months/ Klein, E., Brown, T., Sample, M., Truitt, A.R. Goering, S. (2015). Engineering the Brain: Ethical Issues and the Introduction of Neural Devices.Hastings Center Report,45(6), pp.26-35. Manjula, R.P. Shanmugan, D.R. (2016). A Study on Customer Preference Towards Cyber Crime With Banking Industry.International Journal of Multidisciplinary Research and Modern Education,2, pp.597-603. Moon, S.H. Park, D.W. (2016). Forensic Analysis of MERS Smishing Hacking Attacks and Prevention.International Journal of Security and Its Applications,10(6), pp.181-192. Park, D. W., Roo, K. H. (2013). Analysis of Internet Banking Security Crack Through Messenger Hacking. InFuture Information Communication Technology and Applications(pp. 179-187). Springer Netherlands. Roberts, L.D. Allen, P.J. (2015). Exploring ethical issues associated with using online surveys in educational research.Educational Research and Evaluation,21(2), pp.95-108. Salman, A., Saad, S. Ali, M.N.S. (2013). Dealing with Ethical Issues among Internet Users: Do We Need Legal Enforcement?.Asian Social Science,9(8), p.3. Sethi, R. (2015). Analysis of Security Algorithms used in E-Commerce and ATM Transactions.Analysis,11(08), pp.19-24.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.