您现在的位置是:探索 >>正文
【】
探索56人已围观
简介A new strain of Android malware has infected 25 million devices and modified legitimate apps with a ...
A new strain of Android malware has infected 25 million devices and modified legitimate apps with a malicious ads module, according to a report by the security company Check Point.
It's believed the malware originated from a Chinese internet company that helps Chinese Android developers publish and promote their apps in foreign markets. The malware was disguised as Google-related updaters and "vending modules," which hid its own app icons and automatically replaced already-installed legitimate apps with its own version without the user knowing. This lead the researchers to name the malware "Agent Smith" because its behavior is similar to the character in the film The Matrixof the same name.
The malware first appeared in popular third-party app store 9Apps and targeted mostly Indian, Pakistani and Bangladeshi users. However, of the 25 million affected devices, 303,000 infections were detected in the US, and 137,000 in the UK.
Apps that were modified include WhatsApp, Opera Mini, Flipkart, as well as software from Lenovo and Swiftkey. The malware detected which apps were installed, patched them with a malicious ads modules, and then re-installed them on the device. For the user, it simply looks like the app is being updated as expected. Once the update is complete, the owner of the malware can then profit from the newly included ads.
Check Point believes the same malware could also be used for more malicious purposes such as credit card theft, with the company's report stating, "due to [the malware's] ability to hide its icon from the launcher and impersonates any popular existing apps on a device, there are endless possibilities for this sort of malware to harm a user's device."
The security firm says they submitted data to Google and law enforcement agencies, and as of publishing no malicious apps remain on the Play Store. Nevertheless, the malware managed to survive for as long as it did because, despite the original vulnerability Agent Smith was based on being patched in Android years ago, developers did not sufficiently update their applications.
Malware like this, "requires attention and action from system developers, device manufacturers, app developers, and users, so that vulnerability fixes are patched, distributed, adopted and installed in time," Check Point says.
Featured Video For You
Security flaw in Zoom allows website to turn on your Mac's camera without consent
TopicsAndroidCybersecurity
Tags:
转载:欢迎各位朋友分享到网络,但转载请说明文章出处“夫榮妻貴網”。http://new.maomao321.com/news/18f52899453.html
相关文章
Nate Parker is finally thinking about the woman who accused him of rape
探索Nate Parker is getting a crash course in male privilege after, in his own words, not thinking about ...
【探索】
阅读更多7 questions to ask before switching cell phone carriers
探索Your current cell phonecarrier isn’t cutting it anymore, and you’re ready for a change. ...
【探索】
阅读更多This Kanye West photo makes the most uplifting lock screen
探索If you've ever wanted Kanye West to have a direct impact on your life, put a photo of him as your lo ...
【探索】
阅读更多
热门文章
- Sound the alarms: Simone Biles finally met Zac Efron
- All the hosts are leaving 'Great British Bake Off' but Americans should still watch
- The Winklevoss twins want to make Bitcoin more mainstream with daily auctions
- How to check if you've been the victim of a breach like the Yahoo hack
- Richard Branson 'thought he was going to die' in bike accident
- For $16,000, you can hunt with eagles in the wilds of Mongolia
最新文章
U.S. pole vaulter skids to a halt for national anthem
Facebook disables user's account for sharing a cat photo
Hillary Clinton walks world’s thinnest tightrope in debate with Donald Trump
Chrissy Teigen defends Kim Kardashian and explains the weirdness of fame
Fyvush Finkel, Emmy winner for 'Picket Fences,' dies at 93
British politician returns after Twitter hiatus, is immediately trolled