时间:2024-11-21 22:17:27 来源:网络整理编辑:綜合
A new strain of Android malware has infected 25 million devices and modified legitimate apps with a
A new strain of Android malware has infected 25 million devices and modified legitimate apps with a malicious ads module, according to a report by the security company Check Point.
It's believed the malware originated from a Chinese internet company that helps Chinese Android developers publish and promote their apps in foreign markets. The malware was disguised as Google-related updaters and "vending modules," which hid its own app icons and automatically replaced already-installed legitimate apps with its own version without the user knowing. This lead the researchers to name the malware "Agent Smith" because its behavior is similar to the character in the film The Matrixof the same name.
The malware first appeared in popular third-party app store 9Apps and targeted mostly Indian, Pakistani and Bangladeshi users. However, of the 25 million affected devices, 303,000 infections were detected in the US, and 137,000 in the UK.
Apps that were modified include WhatsApp, Opera Mini, Flipkart, as well as software from Lenovo and Swiftkey. The malware detected which apps were installed, patched them with a malicious ads modules, and then re-installed them on the device. For the user, it simply looks like the app is being updated as expected. Once the update is complete, the owner of the malware can then profit from the newly included ads.
Check Point believes the same malware could also be used for more malicious purposes such as credit card theft, with the company's report stating, "due to [the malware's] ability to hide its icon from the launcher and impersonates any popular existing apps on a device, there are endless possibilities for this sort of malware to harm a user's device."
The security firm says they submitted data to Google and law enforcement agencies, and as of publishing no malicious apps remain on the Play Store. Nevertheless, the malware managed to survive for as long as it did because, despite the original vulnerability Agent Smith was based on being patched in Android years ago, developers did not sufficiently update their applications.
Malware like this, "requires attention and action from system developers, device manufacturers, app developers, and users, so that vulnerability fixes are patched, distributed, adopted and installed in time," Check Point says.
TopicsAndroidCybersecurity
Old lady swatting at a cat ends up in Photoshop battle2024-11-21 21:31
Millie Bobby Brown leaves Twitter after becoming the target of horrible meme2024-11-21 21:22
'The Onion' promises it won't stop trolling Facebook and Mark Zuckerberg2024-11-21 21:10
Thanos reads Trump's tweets on 'The Late Show' with Stephen Colbert2024-11-21 21:04
Pole vaulter claims his penis is not to blame2024-11-21 21:02
Reddit went down briefly and no one knew what to do with themselves2024-11-21 20:49
Shut the f*ck up, Marco Rubio2024-11-21 20:47
Uber is hard at work at offering more than one mode of transportation2024-11-21 20:20
Carlos Beltran made a very interesting hair choice2024-11-21 19:52
‘Jurassic World’: What was the headbutting dinosaur who saved the day?2024-11-21 19:30
Wikipedia co2024-11-21 22:03
Finally, a meme that combines our two main interests: crying and the Nae Nae2024-11-21 22:02
Apple spotlights developers making a difference ahead of WWDC2024-11-21 21:37
The best wildlife livestreams you need to watch all summer2024-11-21 21:23
Researchers create temporary tattoos you can use to control your devices2024-11-21 21:13
Broccoli coffee is a thing, because you're not eating your vegetables2024-11-21 21:03
What E3 told us about the next Xbox and game streaming2024-11-21 20:44
J.K. Rowling sends a truly spell2024-11-21 19:46
Slack goes down again, prompting anxiety everywhere2024-11-21 19:42
Pornhub is introducing closed captioning for their porn2024-11-21 19:32