- 1 hr ago Amazon Great Indian Festival Sale 2021: Discount Offers On Premium Headphones
- 1 hr ago Belkin Introduces Multiple iPhone 13 Series Accessories In India: iPhone 12 Support Included
- 1 hr ago Realme GT Neo 2T Expected To Arrive Soon In Global Market; Coming To India?
- 2 hrs ago Hisense Launches New Full-Array QLED TVs Starting From Rs. 59,990
- Movies Anu Aggarwal Says She Had Just Eight Lines In Aashiqui; 'I Had To Act Through My Eyes'
- Finance This Stock Trades With Gains Of 267% As The Stock Re-Lists To Give Effect To The ‘Scheme Of Arrangement'
- News Haj 2022 process in India will be 100% digital: Mukhtar Abbas Naqvi
- Education NEET MDS 2022 Exam Postponed, Check Revised Schedule Here
- Lifestyle Breast Cancer Awareness Month 2021: Tahira Kashyap Khurrana Gives A Reminder Of Self-love
- Sports Hero Vired becomes La Liga's knowledge partner in India
- Automobiles Tata Punch Vs Tata Nexon; Did Tata Accidentally Kill The Nexon?
- Travel Best Winter Destinations In Andaman And Nicobar Islands
Check Point Researches Discover Hackers Pushing Coronavirus Apps To Takeover Android Devices
Amid the coronavirus outbreak, it seems that hackers have been highly activated in India. Earlier it was reported how cyber attackers are attempting to breach the security system of employees of big and small organizations who are working from home.
In the latest study by Check Point, it has been identified how malicious applications are imitated as coronavirus apps which are designed to take over your Android device.
According to the research note, once the malicious application is installed, a hacker takes intrusive control of your device via a remote shell. Your smartphone's calls, SMS, calendar, files, contacts, microphone and camera can be accessed by the hackers, also, to write, add and send privileges.
The malicious applications were not found on Google Play Store but where it was discovered in new coronavirus-related domains. The report suggests that these domains are created specifically to spread this application.
The Application Can Attack Anyone In 15 Minutes
Check Point reports suggest, "The applications were crafted via Metasploit, a free-penetration testing framework that makes hacking simple. Using Metasploit, anyone with basic computer knowledge can craft the same malicious applications in just 15 minutes. It's as simple as point Metasploit at your target, pick an exploit, choose a payload to drop, and hit Enter." The Metasploit is designed to target people who are searching for coronavirus related content.
Check Point researchers were able to find three samples, created by Metasploit framework, carrying the name - coronavirus.apk. This app can be easily delivered and installed on large numbers of devices and can execute device takeover. Once executed on the Android device, the app starts a service that hides its icon to make it harder to get rid of it.
"It continues by connecting to a C&C server (Command and Control) stored in an array in the malware's code," reads the research note.
According to the reports, Check Point researchers have discovered 16 different malicious apps, all masquerading as legitimate coronavirus apps, which contained a range of malware aimed at stealing users' sensitive information.
How to Protect Yourself?
- Uninstall the infected application from the device
- Install a security solution to prevent future infections
- Update your device Operation System and Applications to the latest version
Tips to Keep Your Mobile Devices Safe
- Don't connect to public Wi-Fi networks
- Enable remote lock and data wipe for mobile devices
- Avoid answering unsolicited calls
- When you surf the web, make sure you only use websites secured with SSL
- Download applications only from the official app stores
Meanwhile, do note that the Apple iPhone users are safe and they needn't have to worry about this malicious app. The researchers haven't found any threats for iOS users. Thanks to the highly-secured operating system.