Just In
- 1 hr ago OnePlus 13 New Leak Reveals Display and Camera Details; What to Expect?
- 1 hr ago iQOO Z9 Series Launching at 04:30 pm Today: How to Watch the Livestream? What to Expect?
- 2 hrs ago Gigabyte Unveils AORUS CO49DQ: A Curved QD-OLED Gaming Monitor for Immersive Entertainment
- 2 hrs ago Oppo K12 Launched with Snapdragon 7 Gen 3 SoC, 120Hz AMOLED Display, 100W Charging
Don't Miss
- News Indian MBBS Student, Dasari Chandu, Dies In Kyrgyzstan After Waterfall Mishap
- Movies Do You Know Kiara Advani Changed Diapers & Taught At A Play School Before Her Grand Bollywood Debut; Deets In
- Finance Vodafone Idea FPO: Shares To Debut Tomorrow; GMP Hints Premium Listing; Shares Slump 9%
- Sports 'They don't want to play Bazball in England, they want to play IPL in India': Virender Sehwag silences Vaughan
- Education MP Board Class 10th, 12 Results 2024 Declared, Know How to Download the Marks Memo
- Automobiles 2024 Kia Carens Secures 3-Star Adult & 5-Star Child Safety Ratings – Detailed Look
- Travel Mumbai Opens BMC Headquarters For Exclusive Heritage Tour
- Lifestyle Summer Style: 6 Must-Try Colors To Stay Fashionably Cool Like B-Town Divas!
CopyCat malware infected 14 million Android devices : Check Point
The malware uses a novel technique to generate and steal ad revenues.
According to new report by Israel-based IT security provider Check Point, CopyCat malware infected 14 million Android devices, rooting approximately 8 million of them, and earning the hackers behind the campaign approximately $1.5 million in fake ad revenues in two months.
The malware affected users mainly in Southeast Asia and spread to more than 2,80,000 Android users in the US, the company said in a blog post.
It said CopyCat is a fully developed malware with vast capabilities, including rooting devices, establishing persistency, and injecting code into Zygote - a daemon responsible for launching apps in the Android operating system - that allows the malware to control any activity on the device.
"It is unclear who is behind the CopyCat attack, however, there are several connections to MobiSummer, an ad network located in China," it added.
"The malware also refrains from targeting Chinese devices, suggesting the malware developers are Chinese and want to avoid any investigation by local law enforcement, a common tactic in the malware world," the blog post further said.
The malware uses a novel technique to generate and steal ad revenues.
According to the researchers, the campaign was spread via popular apps, repackaged with the malware and downloaded from third party app stores, as well as phishing scams.
However, there was no evidence that CopyCat was distributed on Google Play Store.
-
99,999
-
1,29,999
-
69,999
-
41,999
-
64,999
-
99,999
-
29,999
-
63,999
-
39,999
-
1,56,900
-
79,900
-
1,39,900
-
1,29,900
-
65,900
-
1,56,900
-
1,30,990
-
76,990
-
16,499
-
30,700
-
12,999
-
16,026
-
14,248
-
14,466
-
26,634
-
18,800
-
62,425
-
1,15,909
-
93,635
-
75,804
-
9,999