Just In
- 1 hr ago Qualcomm Reveals Snapdragon X Plus Chip for Laptops: 10 Core CPU, On-Device AI, & Much More
- 1 hr ago Flipkart Teases “Jaw-Dropping” Discount on iPhone 15: All-Time Low Price Anticipated
- 1 hr ago President Joe Biden Signs Bill to Ban TikTok in the US: Unless This One Condition is Met
- 3 hrs ago Qubo InstaView Video Door Phone Launched in India: Check Price, Features
Don't Miss
- Movies Vahbiz Dorabjee On Being Offered Mother Roles; Losing 10 Kgs & Stunning Transformation: I Was Impacting My…
- News Rs 4 Crore Cash Seizure Case: BJP Leader Nainar Nagendran To Appear Before TN Police On May 2
- Finance Rs 7.50/Share Dividend: Adani Group Cement Company Reports Strong Q4 Results; Profit Surges 2x YoY
- Education Tamil Nadu SSLC Results 2024: Number of Ways you can check the Results
- Automobiles Bajaj To Offer Chetak Electric Scooter At Lower Price Point: All Details Here
- Sports Bangladesh vs Zimbabawe: Will Shakib Al Hasan Play Home T20 Series In May Or Not?
- Lifestyle Heeramandi Screening: Alia Bhatt, Ananya Panday, Rashmika Mandanna And Others Serve Finest Ethnic Style!
- Travel Escape to Kalimpong, Gangtok, and Darjeeling with IRCTC's Tour Package; Check Itinerary
Check Point Researches Discover Hackers Pushing Coronavirus Apps To Takeover Android Devices
Amid the coronavirus outbreak, it seems that hackers have been highly activated in India. Earlier it was reported how cyber attackers are attempting to breach the security system of employees of big and small organizations who are working from home.
In the latest study by Check Point, it has been identified how malicious applications are imitated as coronavirus apps which are designed to take over your Android device.
According to the research note, once the malicious application is installed, a hacker takes intrusive control of your device via a remote shell. Your smartphone's calls, SMS, calendar, files, contacts, microphone and camera can be accessed by the hackers, also, to write, add and send privileges.
The malicious applications were not found on Google Play Store but where it was discovered in new coronavirus-related domains. The report suggests that these domains are created specifically to spread this application.
The Application Can Attack Anyone In 15 Minutes
Check Point reports suggest, "The applications were crafted via Metasploit, a free-penetration testing framework that makes hacking simple. Using Metasploit, anyone with basic computer knowledge can craft the same malicious applications in just 15 minutes. It's as simple as point Metasploit at your target, pick an exploit, choose a payload to drop, and hit Enter." The Metasploit is designed to target people who are searching for coronavirus related content.
Check Point researchers were able to find three samples, created by Metasploit framework, carrying the name - coronavirus.apk. This app can be easily delivered and installed on large numbers of devices and can execute device takeover. Once executed on the Android device, the app starts a service that hides its icon to make it harder to get rid of it.
"It continues by connecting to a C&C server (Command and Control) stored in an array in the malware's code," reads the research note.
According to the reports, Check Point researchers have discovered 16 different malicious apps, all masquerading as legitimate coronavirus apps, which contained a range of malware aimed at stealing users' sensitive information.
How to Protect Yourself?
- Uninstall the infected application from the device
- Install a security solution to prevent future infections
- Update your device Operation System and Applications to the latest version
Tips to Keep Your Mobile Devices Safe
- Don't connect to public Wi-Fi networks
- Enable remote lock and data wipe for mobile devices
- Avoid answering unsolicited calls
- When you surf the web, make sure you only use websites secured with SSL
- Download applications only from the official app stores
Meanwhile, do note that the Apple iPhone users are safe and they needn't have to worry about this malicious app. The researchers haven't found any threats for iOS users. Thanks to the highly-secured operating system.
-
99,999
-
1,29,999
-
69,999
-
41,999
-
64,999
-
99,999
-
29,999
-
63,999
-
39,999
-
1,56,900
-
79,900
-
1,39,900
-
1,29,900
-
65,900
-
1,56,900
-
1,30,990
-
76,990
-
16,499
-
30,700
-
12,999
-
11,999
-
16,026
-
14,248
-
14,466
-
26,634
-
18,800
-
62,425
-
1,15,909
-
93,635
-
75,804