The sophistication of the means of defense and IT security pushes third parties to redouble their imagination in order to be able to be successful in their companies to infection systems.Indeed, ill -intentioned individuals have spread on the canvas of advertising which once installed on an Android "root" terminal the device without the user's knowledge in order to have administrator privileges.They also take advantage to settle as system applications.Being also an audience, malware does not fail to display intrusive advertising on the infected device screen.Once the rooted phone and the application is installed, it is almost impossible for the user to delete this malicious software, because no prompts to uninstall the A application appears in the administration tools of the Android device.The viable alternative that offers users would be to acquire another terminal, based on the observations made by Lookout.To achieve such a feat, the authors of these malware recover from Google Play, healthy software and inject them malicious code and recompile these.They will then post them on third -party application stores.When a user installs such an application, the latter takes her device hostage by performing all the actions described above.It should be remembered that in general, applications do not have access to files created by other applications.However, after the device has been rooted, these safety measures are easily bypasses.Users' private data is therefore at the mercy of the one who controls adware.In the professional field, this could have greater consequences if the malicious actor got hold of the sensitive data of a company.On the developer side, the latter are also impacted by the consequences of these infected applications, because the latter undermine the reputation of the legitimate application.Lookout underlines that it has detected more than 20,000 application samples recomposed with features of Trojan and advertising horses that pretend to be legitimate applications.According to the security firm, several applications, some of which are well known have already been offered on the web with modified code.In the lot, we can cite for example Candy Crush, Facebook, Googlenow, Nytimes, Okta, Snapchat, Twitter, Whatsapp, and many more.In addition, by retrospective of the malware detected, Lookout managed to index three families of malware responsible for these packages.These are Shedun, Shuanet, and Shiftybug.All these three malicious software has the features of Trojan advertising and horses.In addition, with the exception of Shedun, the other two adware has the capacity to root Android phones without the knowledge of users.According to statistics issued by Lookout, the countries most affected by these malware families are the United States, Germany, Iran, Russia, Jamaica, Sudan, Brazil, Mexico and Indonesia. Source : Blog LookoutEt vous ?Que pensez-vous de ces nouveaux malwares découverts ?Avez-vous une solution pour les supprimer ?Voir aussiForum Mon application mobile
SOS Public Hospital: our revelation...
01/06/2022
SOS Public Hospital: our revelation...
The best smartphones for gaming in...
Google Maps: activate the new widge...
Free tips in video: Free Mobile off...