CYBER NEWS

Alerta Matrix: Agente Smith Malware infecta Silenciosamente 25M dispositivos Android

Security researchers just came across a new type of mobile malware “that has quietly infected around 25 million devices” without users being aware of the infection.

The malware is targeting Android users and is called Agent Smith after the Matrix popular character, probably because of its silent and sneaky behavior. The infection stems from an unofficial Android app store. According to Check Point researcher, a Agente Smith de malwares is disguised as a Google related application, and its core part exploits a range of known Android security flaws.




The malware is even capable of automatically replacing installed apps with their malicious versions, without the user’s knowledge or interaction. The purpose of the Agent Smith malware is not surprising – it aims to push advertisements and hijack valid ad events.

The primary victims of the malicious campaign are Android users based in India, but other Asian countries such as Pakistan and Bangladesh are also impacted. Affected devices are also discovered in the UK, Australia and the US, os pesquisadores disseram.

How does the Agent Smith malware infection happen?

There are three stages of the infection process. The first stage aims to trick the user to download a dropper application from an app store such as 9Apps. To successfully lure the user, these droppers are presented as useful or free applications. Free games or adult entertainment apps are also used.

The dropper application then checks if any popular applications, such apps include WhatsApp, MXplayer, ShareIt and more from the attacker’s pre-determined list, are installed on the device. If any targeted application is found, “Agent Smith” will then attack those innocent applications at a later stage, segundo o relatório.

The second infection phase involves the dropper automatically decrypting the malicious payload into its original form, which is an APK file. This file is the malware’s core part of the attack. This is also the time when the malware leverages the known Android vulnerabilities without the user’s interaction.

relacionado: Next-gen Xloader Android e iOS Spyware está sendo espalhado em todo o mundo

During the third stage, the core part of Agent Smith malware will attack each installed application on the compromised Android device, according to its target list. “The core malware quietly extracts a given innocent application’s APK file, patches it with extra malicious modules and finally abuses a further set of system vulnerabilities to silently swap the innocent version with a malicious one”, os pesquisadores disseram.

To remove bogus apps such as the ones involved in the Agent Smith malware campaign, você pode seguir estes passos simples:

1. Go to Settings Menu
2. Click on Apps or Application Manager
3. Scroll to the suspected app and uninstall it.

If the app can’t be located, then simply remove all recently installed apps, as per the researchersadvice.

Milena Dimitrova

Milena Dimitrova

Um escritor inspirado e gerenciador de conteúdo que foi com SensorsTechForum desde o início. Focada na privacidade do usuário e desenvolvimento de malware, ela acredita fortemente em um mundo onde a segurança cibernética desempenha um papel central. Se o senso comum não faz sentido, ela vai estar lá para tomar notas. Essas notas podem mais tarde se transformar em artigos! Siga Milena @Milenyim

mais Posts

Me siga:
Twitter

Deixe um comentário

seu endereço de e-mail não será publicado. Campos obrigatórios são marcados *

limite de tempo está esgotado. Recarregue CAPTCHA.

Compartilhar no Facebook Compartilhar
Carregando...
Compartilhar no Twitter chilrear
Carregando...
Compartilhar no Google Plus Compartilhar
Carregando...
Partilhar no Linkedin Compartilhar
Carregando...
Compartilhar no Digg Compartilhar
Compartilhar no Reddit Compartilhar
Carregando...
Partilhar no StumbleUpon Compartilhar
Carregando...