Malicious fake Android AV apps pushed onto users
Posted on 18.05.2012
It seems that every week a new way of targeting Android users with malware is discovered, and most often than not, Russian users are primary targets.

Sophos' researcher Vanja Svajcer followed links lately disseminated through Twitter, and landed on a number of .ru domains pointed to the same IP address hosted in Ukraine.

"Depending on the URL you click on and URL parameters, you might be prompted (in Russian) to install fake updates for a variety of products including the Opera browser and Skype," Graham Cluley reports. "Or you might be presented with a page which prompts you to run a security scan on your phone."


The scans are, of course, bogus, and the apps offered after them are as well.

They appear to be antivirus applications - and sometimes they even present icons stolen from legitimate security firms such as Kaspersky Lab - but most of the time are actually premium rate Trojans.

Also, if one is very unlucky, the downloaded Trojans also have the ability to download further malware onto the device.






Spotlight

Windows 0-day exploited in ongoing attacks, temporary workarounds offered

Posted on 22 October 2014.  |  Microsoft is warning users about a new Windows zero-day vulnerability that is being actively exploited in the wild and is primarily a risk to users on servers and workstations that open documents with embedded OLE objects.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Oct 23rd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //