Google announced last year that it had blocked 1.2 million apps that violated its Google Play policy (Photo: Applicantes)
Mobile is an operating center where all kinds of valuable information is stored: from photos to email messages and much more. Securely protecting this type of device is key to preventing you from losing information or being exposed to other types of computer attacks.
Here are some of the most common types of malware on Android phones, according to an Eset investigation:
Ransom program
This is the type of malicious code that blocks a device and in many cases also encrypts files on the device. The attacker asks the victim to pay a ransom for access to material that has been encrypted and thus made inaccessible.
Researchers in recent years have discovered some of the ransomware of Android, including one hidden behind a fake COVID-19 contact tracking application aimed at users in Canada. They also spotted a campaign spreading malware that was spread using his victim’s contact list, which he sent via SMS with malicious links.
Bank Trojans
In this case, The attack is focused Stealing credentials from online banking platforms And many times they can bypass two-tier authentication systems.
Once the application is installed, the malware performs a series of actions on the device and activates a feature that allows it to steal bank certificates and Also a wallet seed phrase or recovery key Cryptocurrencies.
All this information is sent to the attacker’s server. One that has made a big impact recently is FluBot, which has mainly affected Spain and other European countries, according to experts.
In the case of remote access trojans, an attacker has access to all computer information (Photo: Pixabay)
RAT (Remote Access Trojans)
The purpose of these types of programs is to spy on the victim’s device by following the commands sent remotely by the attacker. In this case, the attack could be carried out, for example, by keyloggers, which record each keystroke, or by other means of interrupting communication between the computer and various applications.. This type of program can steal bank credentials or take photos or videos of victims without their knowledge.
What to do if the computer is infected
If the computer is infected, then It is convenient to check if there are no hidden applications on the computer. To do this, you need to activate the safe mode of the equipment.
The first step is to press the power button until an option appears “აფრთხოSecure Mode”. On some models, the Shutdown option appears when you click the shutdown button and you have to press it again until the above legend appears and then click on this option again.
Then you have to go To install o Options and enter there Applications. You will find a list of all the downloading apps. You need to check if you found any weird names or do not remember to download and delete them.
Before removing any application, It is convenient to pre-search trusted sites to confirm that the utility is not crashed.
Keep in mind that this technique may or may not work. It all depends on the type of malware installed and the hardware used by the cyber attacker. In any case, after performing these steps, if you suspect that the device is still damaged, it is advisable to consult a specialist.
How to avoid these attacks
1. Download apps only from the official store, Which for Android is Google Play. It should be noted that Google announced last year that it had blocked 1.2 million apps that violated its policy to Google Play and that it had taken other actions aimed at blocking malicious apps. In this regard, one of the major preventative measures when it comes to mobile care is to avoid downloading apps outside of official stores.
2. Update the operating system To make sure you have all the safety patches.
3. Have a backup copy of the information in the cloud in case the equipment is eventually damaged so as not to lose any kind of information.
4. Have a security solution to enhance care.
Continue reading: