The word "selfie" is now firmly an entrenched fragment of popular culture. It is such a prevalent activity that Oxford Dictionaries named it "Word of 2013."
Defined as "a photograph that one has taken of oneself, typically with a smartphone or webcam and uploaded to a social media site," the selfie is actually expanding from its narcissistic social media abode to more practical uses like biometric identification by mobile banking apps such as MasterCard.
If that sounds a little iffy due to obvious privacy (and vanity) concerns, then maybe this will take you off the selfie train for good. Hackers and cybercriminals are starting to sneak in malware that asks the victim to take final photos after gorging itself with stolen banking data.
Recently discovered, this selfie requesting banking Trojan infects Android smartphones and tablets by disguising itself as a codec or plugin required to view video content.
If the victim is curious enough to click and allow the "codec installation," this actually grants the Trojan malware all the permissions it needs to execute its sinister reason for being: stealing your data by overlaying phishing credit card information pages over legitimate apps.
This Trojan is actually a new variant of the Acecard phishing overlay malware for Android we've reported about before. Once activated, the malware lurks in the background and waits for the victim to open and launch specific apps that require credit card information. (Examples of these targeted apps are Google Play, Android Music, Videos, Books and Games, WhatsApp, Viber and Dropbox.)