The Limited Times

Now you can see non-English news...

Malware: what are the most dangerous viruses in the world and the measures to protect your cell phone

2023-04-21T10:28:55.698Z


Cyber ​​criminals seek to steal information and control features of Android devices. Users of mobile devices with the Android operating system (from Google) have been threatened or directly suffered attacks  with at least three malware or computer viruses  in the last month. According to a recent report from the cybersecurity company Checkpoint , the list is headed by Alienbot mobile malware , followed by FluBot and xHelper . As specialists point out, the Alienbot computer virus


Users of

mobile devices with the

Android

operating system

(from Google) have been

threatened

or directly

suffered attacks

 with at least three

malware

or

computer viruses 

in the last month.

According to a recent report from the cybersecurity company

Checkpoint , the list is headed by

Alienbot

mobile malware

, followed by

FluBot

and

xHelper

.

As specialists point out, the Alienbot computer virus belongs to the 

Malware-as-a-Service (MaaS)

family for Android devices.

This virus allows a remote attacker, in a first step,

to inject malicious code into

legitimate financial applications, such as Home Banking or Exchanges.

Once the cybercriminal takes control of the device, he immediately gains 

access to the victims' accounts

, without any hindrance.

FluBot

is an Android malware that is distributed via phishing SMS messages (Smishing), most of the time posing as logistics delivery brands.

Once the user clicks on the link within the message, they are redirected to a download of a fake application containing FluBot.

Once installed, the malware has several capabilities to

collect credentials and support the Smishing operation itself

, including uploading the contact list as well as sending SMS messages to other phone numbers. 

And xHelper

 is a rogue app seen since March 2019, used to download other rogue apps and display ads.

This malware has the ability to

hide itself from the user

and reinstall itself

in case it was uninstalled.

How an Android phone "catch" malware

Photo: Shutterstock

In principle, it must be clear that the risk that all the information stored on a device will run depends exclusively on the uses and customs of the users, specifically, the applications that are usually

downloaded

or the

visit to websites

of dubious origin.

"What we see the most are

Trojanized applications

, that is, applications that pretend to be some kind of legitimate service or platform, generally for reading PDFs, instant messaging services, downloading from a site that claims to be the official one, or even official stores", said 

Martina López

, Computer Security Researcher at

ESET Latin America

.

And he added: "Although obviously stores like the Google Play Store have certain controls in place, the reality is that since there are so many applications, some are exposed when it comes to filtering them."

Most of these malware, once they infect the device, have the characteristic of

acting as spying applications

in the sense of recording keystrokes.

When you enter an application, as explained by ESET, the cybercriminal can lift the password placed.

Also

review the victim's messages

, phone calls, photographs, videos.

On the other hand,

subscribing to premium type SMS services

can be a vector of contagion, even though they are in disuse.

The

indicators

that can show that a cell phone is under the control of a cyber attacker manifests itself in behaviors that the user is unaware of, that is, messages sent, calls made, images in the gallery that are not recognized.


For this reason and to avoid greater evils, the specialist recommends 

checking the reviews

, the number of downloads it has and that it is a known version, even if they are in the paid mode.

Second, investigate a little more the developer user behind that application.

The Google Play Store usually groups those developed by the same users, with which it is possible to enter and

see the Privacy Policy

.

Even the endless annex of the terms and conditions.

How manufacturers protect Android cell phones

Photo: Checkpoint

The companies that are in charge of manufacturing smartphones, such as

Samsung or Motorola

, invest budget not only to innovate in design or more powerful cameras, but also in computer security to protect the information of their users.

For their business and professional devices,

Samsung relies on Knox

to enhance their workflows and enable them to use and manage Galaxy family devices in as secure an environment as possible.

Although it is not specifically an antivirus, this security tool from the Korean giant fulfills the task of

managing the permissions

that a user will have on their device.

Specifically, Samsung Knox restricts mobile applications from automatically downloading outside the Google Play Store, access to potentially harmful website addresses (urls), access via USB, manages the firewall and the connection to secure Wi-Fi networks, among other things.


Motorola devices, meanwhile, are insured by  Lenovo-owned

ThinkShield

, which optimizes protection from manufacturing to the end user.

Its main features include protection against malicious software, identity theft and other threats. 

Some family computers, like your latest premium phone motorola edge 30 ultra, for example, have another layer of protection:

Moto KeySafe

, which is physically separate from the main processor that runs Android.

"This tool provides

greater hardware security

to guarantee the protection of confidential data: PINs, passwords and cryptographic keys are hidden, and stored in a secure environment", remarked Pablo Brancone, Product Manager of Motorola Argentina.

However, those who end up being victims in most cases do not have a security solution installed on the device.

In a series of surveys recently carried out by ESET among 70 security managers from different companies in Latin America,

only 10% said they had this kind of protection

"These issues are not reported or not reported to official stores, or to security companies. Usually people factory reset their phone or give it up for lost. Even if they don't realize they are under attack, they follow it using", reflected Martina López from ESET.

SL

look too

The first beta version of Android 14 is now available: what's new

How to know if your cell phone has been tapped and what to do to protect yourself

Source: clarin

All tech articles on 2023-04-21

You may like

Trends 24h

Tech/Game 2024-04-16T05:05:15.331Z
Tech/Game 2024-04-16T05:05:07.406Z

Latest

© Communities 2019 - Privacy

The information on this site is from external sources that are not under our control.
The inclusion of any links does not necessarily imply a recommendation or endorse the views expressed within them.