Which One Deserves To Die – Your Phone or Malware?
-BY Govind Rammurthy, MD & CEO, eScan
Mobile malware is malicious software that is specifically built to attack mobile phones or Smart phones. These types of malware rely on exploits of particular operating systems (OS) and mobile phone software technology, and represent a significant portion of malware attacks in today’s computing world, where mobile phones are increasingly common.
Mobile Malwares have been designed by the Hackers to steal financial information of users. GM Bot is the biggest malware family and it contains a number of mobile malwares. Mobile malware collects and exfiltrates, malware collects information like user location, browsing history and list of installed applications and it is being sold for financial gain by malware authors.
Acecard, SlemBunk, Slempo, MazarBot and Bankosy are some famous banking malwares. Besides GM Bot, many other malware families are present such as Bilal Bot, Cron Bot, KNL Bot etc. GM Bot malware family is on top for stealing financial details of users from Mobile Phones through Phishing and Fake Pop-ups. The code of this GM Bot malware contains the scripts which are capable to hide themselves behind the legitimate program files. The malware will work only at that time, when a user will open Banking apps and other financial apps. When user enters his Credit Card and Debit Card’s details, malware store the information in a file and send it to developer’s server through Command and Control Servers.
Within the general category of mobile malware, certain kinds of smart phones are targeted more often than others. Various types of mobile malware include device data thieves and device spies that take certain kinds of data and deliver it to hackers, People use smart phones for shopping, banking, e-mail, and other activities that require passwords and payment in-formation. Banks rely on cell phones for two-factor authentication. Users may also save authentication and payment credentials in text documents on their phones (for example, to use the phone as a mobile password manager). This makes cell phones a target for credential theft. Credentials could be used directly by malware scammer for greater financial gain. Malware launches a phishing attack on the phone and user credentials could also be captured by key logging or scanning which could lead to financial gain for hacker.
Root malware which gives hackers certain administrative privileges and file access. There are also other kinds of mobile malware that perform automatic transactions or communications without the device holders’ knowledge.
SMS attacks involve the creation and distribution of malware by cybercriminals designed to target a victim’s mobile device. These Trojan, in turn, are designed to make unauthorized calls or send unauthorized texts without the user’s knowledge or consent. These calls and texts are subsequently directed to chargeable SMS text services or premium-charge numbers operated by the cybercriminal, generating significant revenue streams for cybercriminal networks.
Mobile Spyware: Loaded as a program onto your device, spyware monitors your activity, records your location and lifts critical information, such as usernames and passwords for e-mail accounts or e-commerce sites. In many cases, spyware is packaged with other seemingly benevolent software and quietly collects data in the background. You may not even notice the presence of spyware until device performance degrades or you run an anti-malware scanner on your tablet or phone. Spyware is now big business.
Spyware secretly gathers confidential information about the mobile user and then relays this data to a third party. In some cases these may be advertisers or marketing data firms, which is why spyware is sometimes referred to as “adware”. It is typically installed without user consent by disguising itself as a legitimate app (say, a simple game) or by infecting its payload on a legitimate app. Spyware uses the victim’s mobile connection to relay personal information such as contacts, location, messaging habits, browser history and user preferences or downloads. Spyware that gathers device information such as OS version, product ID, International Mobile Equipment Identity (IMEI) number, and International Mobile Subscriber Identity (IMSI) number can be used for future attacks.
Mobile Adware: Adware has come a long way from being nothing more than annoying pop-ups and data collection. For many adware makers, revenue depends on the number of clicks and downloads they receive, and according to ZDNet, some have now created “mal-advertising” code that can infect and root your device, forcing it to download specific adware types and allowing attackers to steal personal information.
How to remove malware from Smartphone
Android phone will get infected with viruses from a malicious app that is installed on the smart phones. In this first step, we will try to identify and uninstall any malicious app that might be installed on your Android phone.
1. To uninstall the malicious app from your Android device, go to the Settings menu, then click on Apps or Application manager (this may differ depending on your device).
2. This will bring up a list of installed apps, including the malicious app. In our case the malicious app is “BaDoink” however, this will most likely be different in your case. If you cannot find the malicious app, we advise you to uninstall all the recently installed apps.
3. Touch the app you’d like to uninstall. This won’t start the app, but will open up the program’s App Info screen, then click on “Uninstall” button:
4. A confirmation dialog should be displayed for the malicious app, click on “OK” to remove the malicious app from your Android phone.
5. Reboot your Android phone
In order to secure the Smartphone and to protect the valuable and sensitive data of the smart phone user, a robust antivirus and eScan Mobile Security for Android and iPhones software is highly necessary. Stay safe and be safe!