您现在的位置是:探索 >>正文

【】

探索7866人已围观

简介A new strain of Android malware has infected 25 million devices and modified legitimate apps with a ...

A new strain of Android malware has infected 25 million devices and modified legitimate apps with a malicious ads module, according to a report by the security company Check Point.

It's believed the malware originated from a Chinese internet company that helps Chinese Android developers publish and promote their apps in foreign markets. The malware was disguised as Google-related updaters and "vending modules," which hid its own app icons and automatically replaced already-installed legitimate apps with its own version without the user knowing. This lead the researchers to name the malware "Agent Smith" because its behavior is similar to the character in the film The Matrixof the same name.

The malware first appeared in popular third-party app store 9Apps and targeted mostly Indian, Pakistani and Bangladeshi users. However, of the 25 million affected devices, 303,000 infections were detected in the US, and 137,000 in the UK.

Mashable Light SpeedWant more out-of-this world tech, space and science stories?Sign up for Mashable's weekly Light Speed newsletter.By signing up you agree to our Terms of Use and Privacy Policy.Thanks for signing up!

Apps that were modified include WhatsApp, Opera Mini, Flipkart, as well as software from Lenovo and Swiftkey. The malware detected which apps were installed, patched them with a malicious ads modules, and then re-installed them on the device. For the user, it simply looks like the app is being updated as expected. Once the update is complete, the owner of the malware can then profit from the newly included ads.

Check Point believes the same malware could also be used for more malicious purposes such as credit card theft, with the company's report stating, "due to [the malware's] ability to hide its icon from the launcher and impersonates any popular existing apps on a device, there are endless possibilities for this sort of malware to harm a user's device."

The security firm says they submitted data to Google and law enforcement agencies, and as of publishing no malicious apps remain on the Play Store. Nevertheless, the malware managed to survive for as long as it did because, despite the original vulnerability Agent Smith was based on being patched in Android years ago, developers did not sufficiently update their applications.

Malware like this, "requires attention and action from system developers, device manufacturers, app developers, and users, so that vulnerability fixes are patched, distributed, adopted and installed in time," Check Point says.


Featured Video For You
Security flaw in Zoom allows website to turn on your Mac's camera without consent

TopicsAndroidCybersecurity

Tags:

相关文章

  • WhatsApp announces plans to share user data with Facebook

    探索

    Big changes are coming to WhatsApp. 。On Thursday, WhatsApp announced in a blog post it will begin sha ...

    探索

    阅读更多
  • 寶寶睡覺手腳溫熱後頸涼

    探索

    一般寶寶在睡覺的時候,寶媽們都會用手摸自己的寶寶  ,來判斷寶寶睡覺是否會著涼 ,如果寶寶的身體比較涼 ,就及時的給寶寶蓋被子,但是有一些寶寶可能會出現睡覺手腳溫熱後頸涼的情況,這種情況下可能新手媽媽就不知道 ...

    探索

    阅读更多
  • 少女月經量多是咋回事

    探索

    月經異常問題也成為了困擾越來越多的女性的一個嚴重的婦科問題。但是在大多數時候月經異常並不會對女性的身體造成實質性傷害,所以也有許多女性會選擇性忽略月經異常 。如果月經異常長期放任不治療的話 ,其實會對一位 ...

    探索

    阅读更多