Users of the mobile devices with operating system Android (from Google) have been threatened or directly attacks immediately with at least three malware OR computer viruses in the last month.
According to a recent report from the cyber security firm checkpointthe list is displayed with the mobile malware header alienbotfollowed by Flubot AND xHelper.
As specialists point out, the Alienbot computer virus belongs to the family of Malware as a Service (MaaS) for Android devices.
This virus allows a remote attacker, as a first step, to inject malicious code into financial applications legitimate, such as Home Banking or Exchanges. Once the cybercriminal takes control of the device, he gets it immediately access to victim accountswithout any obstacle.
Flubot is an Android malware that is distributed via phishing SMS messages (Smishing), most often by posing as logistics delivery brands. Once the user clicks on the link within the message, they are redirected to a download of a fake application containing FluBot.
Once installed, the malware has various capabilities for gather credentials and support the smishing operation itselfincluding uploading your contact list, as well as sending SMS messages to other phone numbers.
and xHelper is a rogue app seen since March 2019, used to download other rogue apps and display ads. This malware has the ability to hide from user and reinstall in case it was uninstalled.
How an Android phone “catch” malware
In principle, it must be clear that the risk that all the information stored on a device runs depends exclusively on the uses and customs of the users, specifically, the applications that are downloaded frequently wave visit websites of dubious origin.
“What we observe the most are Trojan applicationsthat is, they pretend to be some kind of legitimate service or platform, usually for reading PDFs, instant messaging services, for a download on a site that claims to be the official one, or even for official stores,” he said. Martina LopezCyber Security Researcher at ESET Latin America.
And he added: “While obviously stores like the Google Play Store have certain controls, the reality is that because there are so many applications, some are exposed when it comes to filtering them.”
Most of these malwares once they infect the device have the characteristic of act as a spy app in the sense of recording the keystrokes.
When logging into an application, as explained by ESET, the cybercriminal can revoke the entered password. Also check the victim’s messagesphone calls, photos, videos.
On the other hand, the subscription to SMS-type services the premium type can be a contagion vector, although it is deprecated.
THE indicators that can show that a mobile phone is under the control of a cyberattacker manifests itself in behavior of which the user is not aware, i.e. messages sent, calls made, images in the gallery that are not recognized.
For this and to avoid greater evils, advise the specialist check the reviewsthe number of downloads it has and that it is a known version, even if they are in paid mode.
Second, investigate the developer user behind that application a little more. The Google Play Store usually groups those developed by the users themselves, with which it is possible to enter and see privacy policy. Also the endless attachment of the terms and conditions.
How manufacturers protect Android mobile phones
Companies responsible for manufacturing smartphones, for example Samsung or MotorolaThey invest budgets not only to innovate in design or more powerful cameras, but also in cybersecurity to protect their users’ information.
As for your professional and business devices, Samsung introduces Knox to improve their workflows and enable them to use and manage Galaxy family devices in the safest possible environment.
While not specifically an antivirus, this security tool from the Korean giant gets the job done manage permissions you will have a user on your device.
In particular, Samsung Knox restricts the automatic download of mobile applications outside the Google Play Store, access to potentially harmful website addresses (url), access via USB, manages the firewall and connection to Wi-Fi networks. Safe fi, among other things.
Motorola devices, meanwhile, are insured by Thinkshield, owned by Lenovo, which optimizes protection from its production to the end user. Its main features include protection against malicious software, identity theft and other threats.
Some family equipment, like your latest premium motorola edge 30 ultra phone, for example, has another layer of protection: Motorcycle KeySafewhich is physically separate from the main processor running Android.
“This tool provides enhanced hardware security to guarantee the protection of confidential data: PINs, passwords and cryptographic keys are hidden and stored in a secure environment,” commented Pablo Brancone, Product Manager of Motorola Argentina.
However, those who end up being victims in most cases do not have a security solution installed on their device. A series of surveys recently conducted by ESET of 70 security managers from different companies in Latin America, only 10% said they have this kind of protection.
“These issues are either not reported or not reported to official stores or security companies. Usually people factory reset their phone or give it as lost. Even if they don’t realize they are under attack, they follow it up using,” reflects Martina Lopez of ESET.
Source: Clarin
Linda Price is a tech expert at News Rebeat. With a deep understanding of the latest developments in the world of technology and a passion for innovation, Linda provides insightful and informative coverage of the cutting-edge advancements shaping our world.