Home Market Android – banking Trojans and other threats to mobile devices in the February 2016
Doctor Web presents its review of malicious programs for mobile devices detected in February 2016. last month, Doctor Web specialists studied a group of dangerous Trojan for Android capable of carrying malicious code injection processes System and perform other malicious functions. In addition, the recorded additional cases of infected mobile banking Trojans.
The threat of the month – mobile devices
In February, Doctor Web specialists studied a group of interrelated Trojans belonging to the family Android.Loki, whose aim was to perform a wide range of malicious functions. One of them was added to Dr.Web virus called Android.Loki.3. This Trojan embeds in the process of system Android library liblokih.so, called Android.Loki.6. Consequently, the other components of this group are capable of operating with system privileges. The Trojans of this family are mainly designed to:
- Collection and removal of applications.
- Turn on or off applications and their components.
- forcing quitting process.
- Display notifications.
- Logging any application as an application services Accessibility.
- Maintain your components and plugins to download from the server.
- Acquisition of information about the infected machine.
They are also capable of sending to the server control and management of the following data:
- List of installed applications
- History Browser
- List
- Call History
- The current geographical position
Most threats, according to statistics collected by the programs Dr.Web for Android
- Adware.WalkFree.1.origin
Unwanted software module built-in apps for Android and responsible for ads on mobile devices.
- Android.Xiny.26.origin
Trojan designed to download and install applications and to display advertisements.
- Adware.Leadbolt.12.origin
Unwanted software module built-in apps for Android and responsible for ads on mobile devices.
Adware.Airpush.31.origin
Unwanted software module built-in apps for Android and responsible for ads on mobile devices.
- Android.Backdoor.326.origin
Trojan performs various malicious functions based on the commands received from cybercriminals.
Banking Trojans
Virus writers continue to distribute a variety of banking Trojans for Android devices. In particular, they are still trying to deceive users of the popular web pages with ads, sending fake SMS messages. When you receive the text message, potential victims that have published their ads on the Web, they are tempted possibility of replacement. Moreover, this message contains a link that supposedly leads to the photographs offered to exchange the product. If you will hit on the link you will be redirected to a fake website, which is in fact a source of infection. Among the Trojans distributed in this way can be mentioned, for example Android.BankBot.97.origin.
Last month showed that the attacker does not intend to stop creating new malicious programs for mobile devices with Android. Therefore specialists Doctor Web will continue to closely watch “światkowi” malware for Android and timely inform users about new threats.
Source: Dr.Web
Kan
Niewierzcy Minutes |
I’m sorry for turning saying. It should be: “Forewarned is forearmed.” |
No comments:
Post a Comment