new malware discovered in Android apps on the Google Play store : DRESSCODE - Bloggerdroidseo Where bloggers relate to learn blogging tips and tricks Bloggerdroidseo Where bloggers relate to learn blogging tips and tricks : new malware discovered in Android apps on the Google Play store : DRESSCODE

Pages

Featured Featured
how-to-use-your-android-device-as
BETTER SEO: Finding keywords for your website
dent-free-data
Sharing of Apk Files on Whatsapp Made Easier
9mobile-special-offer
9mobile Special Data, Get 1GB Data for N200 and 5GB for N1000
mtn-double-data-cheat
New Method To Activate MTN 100% Double Data Bonus Via IMEI Tweaking


Saturday 3 September 2016

new malware discovered in Android apps on the Google Play store : DRESSCODE

Some people dismiss the threat that malware poses in the Android world, but the problem is still real. Individuals with malicious intent will always target the most popular operating systems, and Android is one of them. A new report details a troubling new malware strain that has been found in the wild, and this time around it wasn’t discovered justin shady third-party app stores. It was also found in apps approved in the Google Play store in spite of Google’s various protections.Researchers from Check Pointdiscovered malware they’re calling DressCode in 40 Google Play store apps and more than 400 apps listed in third-party app stores.The company says that the oldest DressCode-infected apps in the Google Play store date back to April 2016, with some of them reaching anywhere from 100,000 to 500,000 downloads. According to the researchers, anywhere from 500,000 to 2,000,000 users might be at risk after downloading the apps.DressCode apps were used to create a botnet that was behind various actions that occurred on devices without users’ knowledge or consent, including generating ad clicks and false traffic to some websites. The following video also explains how DressCode works:“Once installed on the device, DressCode initiates communication with its command and control server,” the researchers wrote. “Currently, after the initial connection is established, the C&C server orders the malware to “sleep,”to keep it dormant until there’s a usefor the infected device. When the attacker wants to activate the malware, he can turn the device into a socks proxy, rerouting traffic through it.”The malware could be even more dangerous than that. “Since the malware allows the attacker to route communications through the victim’s device, the attacker can access any internal network to whichthe device belongs. This can compromise security for enterprises and organizations,” Check Point added.Google has removed the affected apps, but Check Point has a full list of apps that were infectedon this page, so be sure to check it out and ensure that you weren’t exposed.Please don't just Read and Go, KindlyUse the Share button Below, Thanks


Copy the link below and Share with your Friends:

Download Our Official Android App on Google Playstore HERE
OR
Download from another source HERE



No comments:

Post a Comment

Translate

Subscribe now