{"id":16185,"date":"2020-03-24T07:54:23","date_gmt":"2020-03-24T11:54:23","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/ginp-trojan-coronavirus-finder\/16185\/"},"modified":"2021-10-04T20:25:36","modified_gmt":"2021-10-04T16:25:36","slug":"ginp-trojan-coronavirus-finder","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/ginp-trojan-coronavirus-finder\/16185\/","title":{"rendered":"People infected with coronavirus are all around you, says Ginp Trojan"},"content":{"rendered":"<p>As people all around the world started <a href=\"https:\/\/www.kaspersky.com\/blog\/remote-work-security\/34258\/\" target=\"_blank\" rel=\"noopener nofollow\">working from home<\/a> and practicing social distancing, the latter in some cases may evolve into paranoia. Should I avoid contacting everyone, because, who knows, maybe this person has contracted the coronavirus. Or maybe that one? People became somewhat afraid of all other people. And cybercriminals decided to make use of that.<\/p>\n<h2>The Coronavirus Finder (that doesn\u2019t work)<\/h2>\n<p>Cybercriminals behind Ginp, a banking Trojan that we have covered recently (here\u2019s a <a href=\"https:\/\/www.kaspersky.com\/blog\/ginp-mobile-banking-trojan\/32478\/\" target=\"_blank\" rel=\"noopener nofollow\">post about Ginp on Kaspersky Daily<\/a>), are up to a new campaign related to COVID-19. After Ginp receives a special command, it opens a web-page called Coronavirus Finder. It has a simple interface that shows the number of people infected with the coronavirus near you and urges you to pay a small sum to see the location of those people.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2020\/03\/24155905\/ginp-trojan-coronavirus-finder-screenshot-1.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2020\/03\/24155905\/ginp-trojan-coronavirus-finder-screenshot-1.png\" alt=\"The Coronavirus Finder webpage that Ginp Trojan opens\" width=\"536\" height=\"620\" class=\"aligncenter size-full wp-image-16186\"><\/a><\/p>\n<p>Oh, what a relief for some people would it be to know whom to avoid! For some people, the message looks more than convincing, so they proceed to pay the fee. The amount seems to be quite small, so it\u2019s easy to spare. The web-page then offers you to input your card data to make the transaction.<\/p>\n<p>As you may remember, Ginp is a very capable banking Trojan that relies on a lot of different lures to make users input their credit card data into forms, so that it can steal it. If you guessed this web-page is just another form aimed at stealing data \u2014 you\u2019ve guessed it right!<\/p>\n<p>Once you fill in your credit card data, it goes directly to the criminals\u2026 and nothing else happens. They don\u2019t even charge you this small sum (and why would they, now that they have all the funds from the card at their command?). And of course, they don\u2019t show you any information about people infected with coronavirus near you, because they don\u2019t have any.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2020\/03\/24155910\/ginp-trojan-coronavirus-finder-screenshot-2.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2020\/03\/24155910\/ginp-trojan-coronavirus-finder-screenshot-2.png\" alt=\"Once you fill in your credit card data, it goes directly to the criminals\" width=\"672\" height=\"606\" class=\"aligncenter size-full wp-image-16188\"><\/a><\/p>\n<p>Given the speed at which the virus spreads, no one has such information, even the governments. So don\u2019t fall for this lure. What\u2019s more, to see such a web-page pop up on your device, you need to have Ginp on it first. As long as you\u2019re protected and don\u2019t have a Trojan Horse on your phone, you won\u2019t be seeing such notifications.<\/p>\n<p>According to data from Kaspersky Security Network, most users who have faced Ginp, are located in Spain, just as before. However, this is a new version of Ginp that is tagged \u201cflash-2\u201d, while previous versions were tagged \u201cflash-es12\u201d. Maybe the lack of \u201ces\u201d in the tag of the newer version means that cybercriminals plan to expand the campaign beyond Spain.<\/p>\n<p>That\u2019s not the first time we\u2019ve seen cybercriminals exploit the coronavirus topic. They\u2019ve already used it as bait in <a href=\"https:\/\/www.kaspersky.com\/blog\/coronavirus-phishing\/32395\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">phishing messages<\/a> and created coronavirus-themed malware.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic-2\">\n<h2>Staying safe from Ginp banking Trojan<\/h2>\n<p>Our advice on how to stay safe from Ginp Banking Trojan remains the same:<\/p>\n<ul>\n<li>Download apps only from Google Play (and <a href=\"https:\/\/www.kaspersky.com\/blog\/unknown-apps-android\/41656\/\" target=\"_blank\" rel=\"noopener nofollow\">disable the option<\/a> to install apps from other sources).<\/li>\n<li>Stay skeptical. If something seems suspicious \u2013 don\u2019t click and, most importantly, don\u2019t give any sensitive data such as logins, passwords and payment credentials away.<\/li>\n<li>Do not give the Accessibility permission to apps that request it, other than anti-virus apps.<\/li>\n<li>Use a reliable security solution. For example, <a href=\"https:\/\/me-en.kaspersky.com\/mobile-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____3d7d2c33c4c17a10\" target=\"_blank\" rel=\"noopener\">Kaspersky for Android<\/a> is quite aware of Ginp and detects it as Tojan-Banker.AndroidOS.Ginp.<\/li>\n<\/ul>\n<p>For staying safe from the coronavirus, we suggest that you <a href=\"https:\/\/www.who.int\/emergencies\/diseases\/novel-coronavirus-2019\/advice-for-public\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">follow the WHO\u2019s guidelines<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ginp banking Trojan uses information about people infected with coronavirus as bait to lure Android users into giving away credit card data.<\/p>\n","protected":false},"author":2555,"featured_media":16190,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[105,702,2231,2233,1432],"class_list":{"0":"post-16185","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-android","9":"tag-banking-trojans","10":"tag-coronavirus","11":"tag-ginp","12":"tag-mobile-banking-trojans"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ginp-trojan-coronavirus-finder\/16185\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ginp-trojan-coronavirus-finder\/19645\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/ginp-trojan-coronavirus-finder\/8118\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ginp-trojan-coronavirus-finder\/21217\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ginp-trojan-coronavirus-finder\/19486\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ginp-trojan-coronavirus-finder\/17986\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ginp-trojan-coronavirus-finder\/22193\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ginp-trojan-coronavirus-finder\/20973\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ginp-trojan-coronavirus-finder\/27762\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ginp-trojan-coronavirus-finder\/34338\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ginp-trojan-coronavirus-finder\/14549\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/ginp-trojan-coronavirus-finder\/14583\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/ginp-trojan-coronavirus-finder\/13222\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ginp-trojan-coronavirus-finder\/23450\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ginp-trojan-coronavirus-finder\/27953\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/ginp-trojan-coronavirus-finder\/25186\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ginp-trojan-coronavirus-finder\/21922\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ginp-trojan-coronavirus-finder\/27096\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ginp-trojan-coronavirus-finder\/26934\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/coronavirus\/","name":"coronavirus"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/16185","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2555"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=16185"}],"version-history":[{"count":11,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/16185\/revisions"}],"predecessor-version":[{"id":18927,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/16185\/revisions\/18927"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/16190"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=16185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=16185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=16185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}