Hackers Found New Ways to Infect Your Android Device


android antivirus
A malware is the combination of two words, malicious and software. It is a type of software that is used to hack into private computers or to gain access to private information. Recently, a link was posted on twitter by Phil Schiller to a report saying that 99% of all mobile malware is directed at android. Usually the malware does not come from PCs but in through the web as hackers find new ways to deliver Android malware through phishing or other tactics.

A new mobile banking program Trojan.Droidpak however attempts to install malware on android devices when connected to windows computers. Usually it is the android malware that infect the windows systems but this new malware seems to work the other way round.

Trojan.Droidpak installs a counterfeit version of the rather popular Google play store when the device is connected to a computer in the USB debugging mode. USB debugging is a setting on android devices mainly that is not directly related to running android versions or installing new firmware. This method is normally used by developers to install apps but it is also necessary for android devices’ rooting and installation of android firmware. It is not that useful but users may forget to turn it off after use and they don’t need it any more. This way of targeting the android system is very unusual because most hackers prefer using fake applications from third party app stores and social engineering.

Symantec has discovered that the malware seems to be directed at online bankers in Korea. Flora Liu a Symantec researcher wrote that the malicious APK i.e. android application package locates certain Korean online banking apps on the android device and if it finds them misleads the device user to delete them and install the fake versions.

Users are recommended by symantec to disable the USB debugging mode on their android devices and avoid connection of the devices to computers that are not trusted.


Leave a Reply

© 2017 Ask the Geek. All rights reserved.