![]() The permissions allow it to grant administrative rights for all malicious apps that it downloads. The malware makes effective use of the special permissions that it had been granted. ![]() The device also gets infected with a bogus lock screen which cannot be closed. The malicious application which could be ransomware, spyware or any other type of malware gets downloaded onto the device. ![]() The C&C server then sends a link to a malicious application to the infected device. Information about the device and apps on the device are sent. Now the fake Flash Player icon hides from the main screen and the malware contacts its Command & Control Server. These are pretty sensitive permissions that the users must be wary of. And if the victim turns it ON, then the fake “Saving Battery” app requests permission to “Monitor Your Actions”, “Retrieve window content” and “Turn on Explore by Touch”. This popup with an Android logo warns the user that “TOO MUCH CONSUMPTION OF ENERGY” is taking place and that “Saving Battery” needs to be turned ON. When the user runs the purported “update”, another fake popup appears on the screen. ![]() These permissions are then used to download further malicious apps in the background. Once the user downloads the malicious app it asks the victim to grant special permissions. This malware targets even the latest Android operating system versions and the perpetrators spread this Trojan through social media and adult websites. The fake update screen looks pretty authentic too. The malicious app that imitates Adobe Flash Player tricks users into believing that their app requires a safety update. Once initiated it can repeatedly download other malware of its choice to surreptitiously infect the device. New Android Trojan dupes victims with malicious fake Flash security update.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |