Tag Archive for: immediately

The 21 apps Android users should delete immediately over malware concerns


A list of more than 20 apps designed for Android users known to contain malware has been released.

The list was released by Malware Fox, an anti-malware program.

“Currently, there is no better medium with a huge user base than Android,” Malware Fox said.

Stream local 7NEWS free on 7plus 7plus

“Over the last decade, Android has become a soft target for cyberattackers to carry out illicit activities.

“It is because Android is an open-source program, making it highly customisable, unlike iOS.

“It is easy for cybercriminals to infiltrate an Android device using malicious apps.”

The compromised apps contain one of four types of malware.

Harly Trojan obtains data about the user’s device, especially data about the mobile network.

This malware is found in:

  • Fare Gamehub and Box
  • Hope Camera-Picture Record
  • Same Launcher and Live Wallpaper
  • Amazing Wallpaper
  • Cool Emoji Editor and Sticker

Joker Spyware gathers contact lists, SMS messages, and details about affected devices.

This malware also has the capacity to register the device for premium services without consent, monetising the malware infection.

It is found in:

  • Simple Note Scanner
  • Universal PDF Scanner
  • Private Messenger
  • Premium SMS
  • Blood Pressure Checker
  • Cool Keyboard
  • Paint Art
  • Color Message

Autolycos Malware is a Trojan spyware that is known for subscribing victims to paid services.

This malware is found in:

  • Vlog Star Video Editor
  • Creative 3D Launcher
  • Wow Beauty Camera
  • Gif Emoji Keyboard
  • Instant Heart Rate Anytime
  • Delicate Messenger

Fleckpe is another Trojan spyware that is known for subscribing victims to paid services.

This malware is found in:

  • Beauty Slimming Photo Editor
  • GIF Camera Editor Pro

Days after McAfee warning

The warning comes just days after computer security company McAfee warned Android users about new malware.

A new variant of Xloader malware, otherwise known as MoqHao, makes it easier for hackers to access your phone’s data.

While previous versions of Xloader required the phone user to download and open the malware, the new programming means the malware can silently run in the background straight…

Source…

13 Malicious Android Apps You Should Delete Immediately


We’re ending the year with another crop of malicious Android apps you should delete from your phone ASAP.

The McAfee Mobile Research Team uncovered apps in Google Play and third-party app stores that are infected with malware it’s dubbed Xamalicious because it’s “implemented with Xamarin, an open-source framework that allows building Android and iOS apps with .NET and C#.”

Once installed, a malicious app “tries to gain accessibility privileges with social engineering and then it communicates with the command-and-control server to evaluate whether or not to download a second-stage payload.” If the second-stage payload is installed, it can take full control of your device, meaning “it has the potential to perform any type of activity like a spyware or banking trojan without user interaction,” McAfee says.

The apps can also do things like install other apps or click on ads without your consent. The Cash Magnet app, for example, automatically clicks ads and installs apps to fraudulently generate revenue; users think they’re earning points to be redeemable as a retail gift card.

“This means that the developers behind these threats are financially motivated and drive ad-fraud therefore this might be one of the main payloads of Xamalicious,” McAfee says.

McAfee identified 25 apps that contain the threat, 13 of which were distributed on Google Play, some as far back as 2020. It notes that “the usage of the Xamarin framework allowed malware authors to stay active and without detection for a long time, taking advantage of the build process for APK files that worked as a packer to hide the malicious code.

“Malware authors also implemented different obfuscation techniques and custom encryption to exfiltrate data and communicate with the command-and-control server,” McAfee adds.

McAfee estimates the apps have potentially compromised 327,000 devices from Google Play, in addition to any downloads that were made from third-party markets. Most Xamalicious activity was detected in the US, Brazil, and Argentina, though infections were also reported in the UK, Spain, and Germany. 

Google removed the apps from Google Play after McAfee reported them. But there’s a chance you might still have them…

Source…

Slow Wi-Fi is sign to ‘immediately disconnect router’ over spying hack attack – and four other red flags to never ignore


EXPERTS have revealed five major signs that could indicate your Wi-Fi has been hacked.

Wi-Fi is a convenient way to connect to the internet, but it can also be a security risk.

Experts have revealed seven major signs that could mean your Wi-Fi has been hacked

1

Experts have revealed seven major signs that could mean your Wi-Fi has been hackedCredit: Getty

If it’s not properly set up, hackers and cybercriminals can steal your information and even your money.

Below we have shared 5 signs that your Wi-Fi network has been hacked, per Keeper Security.

YOU CAN’T LOG IN

One of the biggest signs your router has been hacked is the inability to log in to your router’s admin settings.

This is likely because cybercriminals broke into your account and changed your password. 

“When hacking a router, your settings are the first place a cybercriminal will look to compromise because they’ll have the ability to change the settings on your router to anything they want,” Keeper Security noted.

“They can then use their elevated privileges to launch other cyberattacks that target you and your data.”

YOUR BROWSER REDIRECTS YOU

Another sign that your router has been hacked is if you’re constantly being redirected to random websites.

For example, you could be trying to go to Facebook.com, but instead, your browser takes you somewhere else.

“Cybercriminals are able to do this by changing your router’s Domain Name System (DNS) and IP address settings,” Keeper Security said.

They also noted that these websites that you’re being redirected to are often harmful.

In this case, you should avoid clicking on something on the website or risk getting malware.

SUSPICIOUS ACTIVITY ALERTS FROM YOUR ISP

If you get suspicious activity alerts from your internet service provider, then your network has likely been hacked.

“Your Internet Service Provider (ISP) has a good idea of how often you use the internet and what you tend to use it for,” Keeper Security noted.

“If your ISP detects increased or unusual activity, they may send you an alert to notify you of the activity,” they added.

However, it’s important to make sure that the notification is legitimately from your ISP.

“You can do this by calling your ISP with the number on their official website to verify that they were the ones…

Source…

iPhone users urged to install new software immediately after powerful security hole found


Apple iPhone Security Update (Copyright 2022 The Associated Press. All rights reserved)

Apple iPhone Security Update (Copyright 2022 The Associated Press. All rights reserved)

iPhone users have been urged to download a new update immediately.

The update was pushed out by Apple to iPhones and iPads after a major security vulnerability was found in the devices.

Patching up that hole with the new software update should keep those devices safe. But without it, attackers could break into an iPhone and spy on its user.

The security issue was found by researchers at the University of Toronto’s Citizen Lab. They said the problem was being “actively exploited” by hackers, and that all users should update immediately.

They were doing so by delivering commercial software called Pegasus, which is made and sold by Israeli company the NSO Group. That software is expensive and targeted, and has primarily been used on specific activists, journalists and politcians, who are likely to know if they are at particular risk of an attack.

The latest attack was used on the iPhone of a member of staff at a US civil society organisation with international offices, Citizen Lab said. It named the new exploit BLASTPASS and said that it did not even require users to click anything on their device.

The NSO Group and Apple have in recent years been engaged in a long-running fight to find and fix security flaws that could allow for the delivery of that software.

Recent iPhone updates brought a new “Lockdown Mode” that places extra restrictions on the device in an attempt to close up potential security flaws. That includes not downloading images that could include spyware, for instance – which is how attackers deliver the hack in this most recent scare.

Downloading the new update is simple. It is done through the Settings app on iPhones and iPads, by clicking the “general” and then “software update” options – that will check for any new updates, and offer the option to download it.

Phones may eventually automatically install the new operating system, which could mean that no download shows up in that screen. Users can check if they have already updated to the new, patched operating system by clicking the “about” option in the general settings, and looking whether they have the…

Source…