Cyber security researchers from Trend Micro discovered a new malware or a malicious program called Godless. This malware targeting the Android operating system 5.1 upwards and works by exploiting dijangkitinya devices.
The problem, according to security researchers institutions that currently about 90 percent of Android devices already use the operating system version 5.1 or higher Lollipops. This means that almost all Android devices Godless threatened attack.
"Based on data from Trend Micro Mobile App Reputation Service, malware associated with this threat can be found in stores of trusted applications, such as Google Play. This malware has been found to affect more than 850 thousand devices worldwide, "wrote Trend Micro Mobile Threat Analyst, Veo Zhang in the study.
Godless similar to the tools commonly used hacker exploits. Additionally malware is equipped with various tools penjebol security loopholes in operating systems and have a rooting ditargetnya framework called Android-rooting-tools.
It works in secret. If the user downloads the app that contains the Godless, the malware does not work right away. He will quietly wait for the phone screen is off then perform the rooting process.
After rooting it is completed, it will issue a Godless intangible encrypted data system and given the name "_image". This file can not be removed easily.
As reported by KompasTekno from Phone Arena, Saturday (06/24/2016), the greatest threat of malware is the ability to control the device remotely.
Once the malware managed to gain access to the root of the Android operating system, then the attacker who controls the malicious program that can install various applications silently and remotely. At worst, Godless can also be used to spy on mobile phone users are already entered.
By knowing their Godless malware, Android users should be more cautious when downloading apps. Even when they download from Google Play Store, make sure there is no suspicious activity.
According to Trend Micro research, Godless often found in utility applications such as flashlights, WiFi, up copies of popular games. In one example, the researchers had found malware in Summer Flashlight application.
The problem, according to security researchers institutions that currently about 90 percent of Android devices already use the operating system version 5.1 or higher Lollipops. This means that almost all Android devices Godless threatened attack.
"Based on data from Trend Micro Mobile App Reputation Service, malware associated with this threat can be found in stores of trusted applications, such as Google Play. This malware has been found to affect more than 850 thousand devices worldwide, "wrote Trend Micro Mobile Threat Analyst, Veo Zhang in the study.
Godless similar to the tools commonly used hacker exploits. Additionally malware is equipped with various tools penjebol security loopholes in operating systems and have a rooting ditargetnya framework called Android-rooting-tools.
It works in secret. If the user downloads the app that contains the Godless, the malware does not work right away. He will quietly wait for the phone screen is off then perform the rooting process.
After rooting it is completed, it will issue a Godless intangible encrypted data system and given the name "_image". This file can not be removed easily.
As reported by KompasTekno from Phone Arena, Saturday (06/24/2016), the greatest threat of malware is the ability to control the device remotely.
Once the malware managed to gain access to the root of the Android operating system, then the attacker who controls the malicious program that can install various applications silently and remotely. At worst, Godless can also be used to spy on mobile phone users are already entered.
By knowing their Godless malware, Android users should be more cautious when downloading apps. Even when they download from Google Play Store, make sure there is no suspicious activity.
According to Trend Micro research, Godless often found in utility applications such as flashlights, WiFi, up copies of popular games. In one example, the researchers had found malware in Summer Flashlight application.
No comments:
Post a Comment