Connect with us

Technology

Hackers can steal money and make your bank account look intact

Published

on

Hackers can steal money and make your bank account look intact

Hackers have become increasingly sophisticated in targeting bank accounts, sometimes stealing money without the account holder realizing it right away. This raises an unsettling concern among many: could someone actually drain your bank account while making it appear as though your balance remains untouched?

As Bruce from Phoenix asks, “Is it true that hackers can wipe out your bank account but make it look like the money is still there?”

The short answer is yes, though it’s rare and requires a high level of skill. Still, even the possibility is alarming, especially when you consider how easily people can fall victim to common tactics hackers use to gain access to accounts in the first place.

Join the FREE “CyberGuy Report”: Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free “Ultimate Scam Survival Guide” when you sign up!

A hacker at work (Kurt “CyberGuy” Knutsson)

Advertisement

How do hackers access your bank account?

There’s a long list of methods cybercriminals use to get into people’s financial accounts, and most of them don’t involve “hacking” in the Hollywood sense. Instead, they rely on tricking you into handing over sensitive information. Here are some of the most common techniques.

Fake banking apps and mobile trojans: Some apps are designed to look exactly like your bank’s official app, but they’re actually fakes. If you enter your login info, it goes straight to the scammer. Even more advanced are mobile banking trojans, which hide inside seemingly unrelated apps. Once installed, the trojan watches for when you open your real banking app and then quickly overlays a fake login screen. If you type in your credentials, the trojan grabs them and sends them off to the attacker.

Phishing scams: Scammers send emails or texts that appear to be from your bank, asking you to verify a transaction or log in to resolve an issue. These messages often include links to websites that look identical to your bank’s site but are actually fakes. The giveaway is often a small detail, like a misspelled URL. For example, “captial0ne.com” instead of “capitalone.com.”

Keyloggers: Keyloggers are a type of malware that silently records everything you type. If one gets onto your device, it can capture your banking username, password and anything else you type, all without you knowing.

Man-in-the-middle attacks: These attacks happen when hackers intercept the data being transmitted between you and your bank’s website. This is especially risky if you’re on public Wi-Fi. You may think you’re logging in securely, but a hacker could be watching everything or even redirecting you to a fake version of your bank’s site.

Advertisement

SIM swapping: SIM swapping is where a scammer contacts your phone provider, pretends to be you and asks to transfer your number to a new SIM card. If successful, they receive your text messages, including any verification codes sent by your bank. This gives them access to your account, even if two-factor authentication is turned on.

Hackers can steal money and make your bank account look intact

A person using a bank card to shop via laptop (Kurt “CyberGuy” Knutsson)

SNEAKY SCAMMERS DRAIN BANK ACCOUNT IN SINISTER PHONE PHISHING SCHEME

Advanced account manipulation

This is where it gets unsettling. In rare cases, hackers can actually make it look like your bank balance hasn’t changed, even though they’ve already taken the money. How? By targeting the display layer of your banking app or web interface. If malware is installed on your device, it can manipulate what shows up on the screen. That means your balance might look normal, while your actual funds are long gone. This type of attack is extremely rare and usually requires access to a compromised or jailbroken device, but it’s technically possible and just sophisticated enough to delay you from realizing what happened.

Hackers can steal money and make your bank account look intact

Bank alert notification on smartphone (Kurt “CyberGuy” Knutsson)

PREVENTING THIS INSIDIOUS EMAIL FORWARDING SCAM THAT WILL DRAIN YOUR BANK ACCOUNT

8 steps to protect your bank account from sophisticated hackers

The good news? You don’t need to be a cybersecurity expert to protect yourself. Just following these key steps can dramatically reduce your risk.

Advertisement

1) Use official apps only: Cybercriminals will try to trick you with fake banking apps and mobile trojans that overlay fake login screens, so it’s critical to download banking apps exclusively from the Apple App Store or Google Play. Never install apps from links in emails or texts.

2) Turn on two-factor authentication (2FA): SIM-swapping attacks can hijack your phone number and intercept SMS codes, so enable app-based 2FA to block unauthorized logins even if hackers obtain your password.

3) Get text or app alerts: Hackers can manipulate your account’s display to hide stolen funds, so set up real-time transaction alerts to expose unauthorized withdrawals immediately, especially for microtransactions used to test your account.

4) Use strong, unique passwords: Phishing scams and keyloggers often harvest weak or reused credentials, so use a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.

5) Avoid clicking suspicious links and install strong antivirus software: Scammers impersonate banks with phishing emails/texts containing misspelled URLs (e.g., “captial0ne.com”), so always navigate directly to your bank’s official website or app instead of clicking embedded links. Strong antivirus software helps protect your devices from fake apps, keyloggers and other threats. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks of the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

Advertisement

6) Check your accounts regularly: Don’t just glance at your balance. Review recent transactions at least once a week to catch any suspicious activity.

7) Avoid public Wi-Fi for banking: Hackers exploit unsecured networks to launch man-in-the-middle attacks and spoof banking sites, so use a VPN to encrypt your connection if you must bank on public Wi-Fi. VPNs will protect you from those who want to track and identify your potential location and the websites that you visit. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

8) Use a personal data removal service: Data brokers sell your contact details and personal information, which hackers can use for targeted phishing attacks or SIM swap scams. These services automatically remove your data from broker databases, reducing the risk of social engineering attempts that could compromise your bank account.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here.

GOT A BANK TRANSFER ALERT TEXT? IT MIGHT BE A SCAM. HERE’S WHAT TO DO

Advertisement

Kurt’s key takeaways

Hackers don’t need to break into your bank’s system; they just need to trick you. Whether it’s phishing, malware or SIM swaps, the goal is always the same: get access to your login and verification codes. Fortunately, you can make it much harder for them by using secure habits and staying alert. Your money belongs with you, not in the hands of a scammer.

Has this ever happened to you or someone you know? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Advertisement

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Anker is recalling over 1.1 million power banks due to fire and burn risks

Published

on

Anker is recalling over 1.1 million power banks due to fire and burn risks

The recall covers about 1,158,000 units that were sold online through Amazon, Newegg, and eBay between June 2016 and December 2022. The affected batteries can be identified by the Anker logo engraved on the side with the model number A1263 printed on the bottom edge. However, Anker is only recalling units sold in the US with qualifying serial numbers. To check if yours is included, you’ll need to visit Anker’s website.

Anker is offering affected consumers their choice of either a $30 gift card (the recalled battery cost around $27) that can be used on Anker.com, or a free 10,000mAh Anker power bank as a replacement (model A1388) featuring upgrades including a charge level display and a USB-C charging cable lanyard.

To receive the gift card or the replacement, Anker requires a “photo of the power bank with the submission date and the word ‘recall’ or ‘recalled’ written clearly in permanent marker,” to be submitted, and a “photo showing the model number and serial number (SN) printed on the bottom of the device.” The company is also requesting a purchase receipt, but it’s not mandatory to participate in the recall.

After confirming that your power bank is one of the recalled units, Anker says it should be taken to a facility that can safely dispose of lithium-ion batteries due to the risk of fire. Those facilities can be found through the Environmental Protection Agency’s website or other organizations in the US that specialize in processing e-waste. Do not throw them in the trash, recycling bins, or used battery boxes provided at various retail locations.

The recall is also a reminder that power banks and backup batteries can potentially develop severe issues over time, as these particular units are almost a decade old. If you’ve been regularly using devices featuring lithium-ion batteries for a while, you’ll want to be mindful of issues like overheating or visible swelling and dispose of them properly if you think there’s a potential problem. And while the technology is currently more expensive than lithium-ion batteries, you can also consider upgrading to solid-state batteries which are more powerful, safer, and longer lasting than what we commonly use now to power our devices.

Advertisement
Continue Reading

Technology

FBI warns over 1 million Android devices hijacked by malware

Published

on

FBI warns over 1 million Android devices hijacked by malware

NEWYou can now listen to Fox News articles!

Everything that connects to the internet can be hacked by malware. 

This includes your phones (both Android and iPhones) and laptops (whether Windows, Mac or even lesser-known systems like Linux). Devices like your Wi-Fi router and security cameras aren’t safe either.

But who would have thought hackers are now targeting your smart TVs, streaming boxes, projectors and tablets, too? That’s right, the FBI warns that bad actors have hijacked over a million of these devices with malware, turning them into unwitting participants in a global cybercrime network.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join.

Advertisement

Remote control and smart TV (Kurt “CyberGuy” Knutsson)

FBI warns: Over 1 million smart devices infected with BadBox 2.0 malware

The FBI is warning that more than a million smart TVs, streaming boxes, projectors and tablets have been infected by a massive malware operation called BadBox 2.0. The malware turns home electronics into participants in a global network of cybercrime, often before the user even powers them on.

In a statement, the FBI says BadBox 2.0 is commonly found on cheap Android-based devices manufactured in mainland China. These include uncertified tablets, connected TV boxes and other Internet of Things hardware. Many of the infected devices ship with the malware preinstalled. Others are compromised during setup, often through malicious firmware updates or sideloaded apps from unofficial marketplaces.

FBI WARNS OF HACKERS EXPLOITING OUTDATED ROUTERS. CHECK YOURS NOW

Once infected, the devices connect to a command and control server, allowing hackers to reroute malicious traffic through home networks, load fraudulent ads in the background and carry out credential-stuffing attacks without the user knowing. Essentially, your smart TV could be quietly helping someone break into other people’s accounts.

Advertisement

The botnet is primarily used to turn infected devices into residential proxy nodes, providing hackers with anonymous access to real home IP addresses. That means your TV or projector might unknowingly be helping cybercriminals bypass security systems, commit ad fraud or brute-force online accounts while hiding behind your internet connection.

person with tablet

A person holding a tablet (Kurt “CyberGuy” Knutsson)

DON’T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOX

Badbox malware history: From TV boxes to over 1 million infected devices

BadBox first appeared in 2023 on generic TV boxes, such as the T95. The original botnet was briefly disrupted in Germany in 2024 when security researchers “sinkholed” the malware’s command servers. That wiped out part of the operation, but not for long. Just a week later, the malware reappeared on nearly 200,000 devices, including more recognizable brands like Hisense smartphones and Yandex TVs.

By March 2025, BadBox had evolved into BadBox 2.0, with more than 1 million active infections detected by HUMAN’s Satori Threat Intelligence team. The majority of devices are uncertified Android Open Source Project builds. These are not official Android TV OS products and are not protected by Google Play Protect.

Researchers say the malware has been spotted in 222 countries. A significant number of infections are concentrated in Brazil, followed by the United States, Mexico and Argentina.

Advertisement

The FBI, working with Google, Trend Micro, HUMAN and the Shadowserver Foundation, recently disrupted communications between more than 500,000 infected devices and their control servers. However, the botnet continues to grow as more compromised products reach consumers and remain unnoticed.

Symptoms of infection include strange app marketplaces, disabled Play Protect settings or devices advertised as being unlocked or capable of free streaming. Many of these products come from unknown brands and are sold through unofficial sellers. If you have recently purchased a budget Android TV box or projector, especially one that is not certified by Google, you may want to take a closer look.

a smart television

Smart TV (Kurt “CyberGuy” Knutsson)

ANDROID SCAM LETS HACKERS USE YOUR CREDIT CARD REMOTELY

How to tell if your device might be infected with BadBox 2.0

If you’re wondering whether your smart TV, streaming box, projector or tablet could be part of the BadBox 2.0 botnet, here are some warning signs and checks you can do.

1. You bought a low-cost Android-based device from an unknown or no-name brand: Devices sold online through third-party sellers or unknown brands, especially if advertised as “unlocked,” “jailbroken” or offering free streaming, are at higher risk. Models like the T95 box or other generic Android TV boxes are known carriers. Specifically, the following devices have been identified as impacted by BadBox malware:

Advertisement

Device model: TV98, X96Q_Max_P, Q96L2, X96Q2, X96mini, S168, ums512_1h10_Natv, X96_S400, X96mini_RP, TX3mini, HY-001, MX10PRO, X96mini_Plus1, LongTV_GN7501E, Xtv77, NETBOX_B68, X96Q_PR01, AV-M9, ADT-3, OCBN, X96MATE_PLUS, KM1, X96Q_PRO, Projector_T6P, X96QPRO-TM, sp7731e_1h10_native, M8SPROW, TV008, X96Mini_5G, Q96MAX, Orbsmart_TR43, Z6, TVBOX, Smart, KM9PRO, A15, Transpeed, KM7, iSinbox, I96, SMART_TV, Fujicom-SmartTV, MXQ9PRO, MBOX, X96Q, isinbox, Mbox, R11, GameBox, KM6, X96Max_Plus2, TV007, Q9 Stick, SP7731E, H6, X88, X98K, TXCZ

2. Your device is not Google-certified: If your Android device doesn’t support Google Play Protect or doesn’t show the Play Protect certification in the Play Store settings, it’s likely running on an uncertified version of Android. That’s a major red flag. To check:

  • Open the Google Play Store.
  • Tap your profile icon > SettingsAbout.
  • Look for Play Protect certification. If it says “Device is not certified,” that’s a problem.

3. Suspicious behavior or strange apps: Look for unfamiliar apps you didn’t install, apps labeled with foreign characters or alternative app stores on your device. BadBox-infected devices often come with shady apps preloaded.

4. Google Play Protect is disabled: If Play Protect has been turned off without your knowledge or is missing altogether, your device may be vulnerable to compromise.

5. Your home internet is acting strange: If your network is unusually slow or your router shows unknown devices connected, one of your smart devices may be hijacked and rerouting traffic as part of a residential proxy network.

6. The device came with outdated or unofficial firmware: If your device doesn’t receive software updates or has a strange update process, that’s another potential sign it’s not legit or may be compromised.

Advertisement

FBI WARNS OF SCAM TARGETING VICTIMS WITH FAKE HOSPITALS AND POLICE

8 ways to protect your devices from BadBox 2.0 and Android malware

Want to stay safe? Here are eight practical steps you can take to protect your smart devices from BadBox 2.0 malware and other hidden Android threats.

1. Use strong antivirus software: Protecting your devices starts with powerful antivirus protection. Malware like BadBox 2.0 often comes preinstalled on cheap, uncertified Android devices, infecting them before you even power them on. A trusted antivirus app can help detect hidden threats, block malicious traffic and warn you about suspicious behavior that might otherwise go unnoticed. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

2. Only buy certified and trusted devices: Stick to devices certified by Google or other recognized platforms. Avoid generic or off-brand Android boxes, tablets and projectors, especially if they are advertised as unlocked or include free streaming. Cheap, uncertified devices are more likely to come with malware preinstalled.

3. Avoid sideloading apps from unofficial sources: Do not install apps from third-party app stores or download APK files from unknown websites. These files can contain hidden malware. Use only official app stores like the Google Play Store that scan apps for threats.

Advertisement

4. Check your device settings for tampering: Look for signs like Google Play Protect being turned off, the presence of unfamiliar app stores or suspicious apps running in the background. These are possible signs your device is compromised.

5. Monitor your network for unusual activity: If your internet slows down suddenly, or you notice unknown devices on your Wi-Fi, investigate. Use your router’s settings or a network monitoring app to track strange behavior or unauthorized connections.

6. Disconnect and replace suspicious hardware: If a device is behaving oddly or was purchased from an untrusted source, unplug it from your network. Consider replacing it with a product from a reputable brand and a verified seller.

7. Keep your devices and apps updated: Install system and app updates regularly. Even though cheap devices may not always offer updates, keeping your software current reduces your risk. Choose brands that are known for providing reliable security patches.

Advertisement

8. Secure your router and home network: Your devices are only as safe as the network they’re connected to. Set a strong, unique password for your Wi-Fi router and update its firmware regularly. Disable remote access unless absolutely necessary and use WPA3 encryption if available. Consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.

As BadBox 2.0 continues to evolve, protecting your entire home network, not just individual devices, has become essential to staying one step ahead of cybercriminals.

THIS IS WHAT YOU ARE DOING WRONG WHEN SCAMMERS CALL

Kurt’s key takeaway

It’s alarming how something as simple as a budget streaming box or projector could be quietly working for cybercriminals. As smart devices become part of almost everything we do, being a careful and informed consumer matters more than ever. Small steps like buying from trusted brands and avoiding unofficial downloads can make a big difference in keeping your home and personal data safe.

Advertisement

With over a million devices infected, who should be held accountable: manufacturers, governments or consumers? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

Advertisement

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Technology

Meta’s new AI video tool can put you in a desert (or at least try to)

Published

on

Meta’s new AI video tool can put you in a desert (or at least try to)

Meta is launching new video editing tools that will let you transform videos using AI. The tool, which is only free for a “limited time,” gives you more than 50 preset prompts you can use to edit your video, allowing you to set a theme, change the background, and tweak what you’re wearing.

The presets are presented similarly to how you would choose a filter on Instagram. You can have Meta AI restyle your clip as a video game or anime, make it appear as if it was taken in the desert, dress you in an AI-generated tuxedo, and more. The tool only works for the first 10 seconds of your video, though. It’s rolling out now in the US and “more than a dozen” countries in the Meta AI app, the Meta.AI website, and the Edits app.

I tried the feature out for myself, and my results certainly didn’t look as good as the examples posted on Meta’s website. I uploaded a video of my parents’ dogs digging a hole in the backyard, and asked Meta AI to make it look like they were in the desert. Meta AI turned the ground orange, put some (purple?) cacti in the foreground and background, and for some reason gave my dogs a shimmery glow. Then, when I asked it to restyle a video of myself as an anime character, Meta AI gave me fluorescent pink eyes and lips.

You can share the edited videos directly to Facebook and Instagram, or put them in the Discover feed in the Meta AI app. Though you can’t use custom prompts right now, Meta says “you’ll be able to edit videos alongside Meta AI with your own text prompts” later this year.

Continue Reading

Trending