Malicious fake Android AV apps pushed onto users
Posted on 18.05.2012
Bookmark and Share
It seems that every week a new way of targeting Android users with malware is discovered, and most often than not, Russian users are primary targets.

Sophos' researcher Vanja Svajcer followed links lately disseminated through Twitter, and landed on a number of .ru domains pointed to the same IP address hosted in Ukraine.

"Depending on the URL you click on and URL parameters, you might be prompted (in Russian) to install fake updates for a variety of products including the Opera browser and Skype," Graham Cluley reports. "Or you might be presented with a page which prompts you to run a security scan on your phone."


The scans are, of course, bogus, and the apps offered after them are as well.

They appear to be antivirus applications - and sometimes they even present icons stolen from legitimate security firms such as Kaspersky Lab - but most of the time are actually premium rate Trojans.

Also, if one is very unlucky, the downloaded Trojans also have the ability to download further malware onto the device.






Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //