Pokémon Go and FIFA guidelines false hijack 600000 androids - Daily Mail

  • 40 fake applications that offer tutorials are popular games on Google Play
  • Experts have warned, take the applications control devices without the user's knowledge
  • False Guide of hackers attempting to create a "silent" army of abducted equipment

Up to two million Android - devices were secretly removed by the new approach of malware, such as Pokémon Go have and FIFA game guide, security experts warned.

popular games in the Google Play expert Check Point Store more than 40 programs that provide fake tutorials.

Experts have warned that malicious applications can take place control of devices without the user's knowledge.

Up to two million Android devices were removed by the new approach of malware as leader of Pokemon games and the FIFA goes secretly, security experts have warned (photo)

How do they work?

Malicious applications work request from the user 'admin' permission.

If you agree, then the malware can be deleted prevented from a phone or tablet.

malicious software secretly records on cloud-based messaging services, send the hacker commands to the device.

In this way, the malware can get full access to a device and use it to launch a cyber attack.

The new strain is called False Guide malware transferred from game manuals on the most popular mobile games, including Pokémon Go and FIFA.

Some of the applications are more than 50,000 copies downloaded, have a these controls experts.

False Guide the hacker could try to create a "silent" army of abducted appliances, warned her.

"The applications are loaded into the application store in November 2016 which means that successfully hidden for five months, an impressive number of downloads accumulate" the researchers OrenKoriat Andrey Polkovnichenko and Bogdan Melnykov said.

"The updated estimate now includes some two million infected user. "

Experts believe that hackers try to infect as many devices as possible to build a "botnet still."

Botnets consist of a network of infected machines, computers and intelligent, such as refrigerators and boilers products.

After a large number of devices, cybercriminals can launch a coordinated attack against companies or businesses.

Game Pokemon Go Viral smartphone was in both Apple Store (left) and Play Android store published (right) in the United Kingdom and the United States last year

How to avoid being attacked

"Users should not leave for their protection on app stores and implement additional security measures on the mobile device, such as the use [products] similar in their security specialists on PCs you check the point.

At the top of the download security software for their phones, users can be hacked by selective about the applications avoid download them.

Players should always check the rating of solutions and caring people all under one four-star.

In fact, often bombard increase hackers, the classification system of five-star ratings they artificially Appreciation of the application.

Read written comments to review the negative comments, is another good way to avoid fraud.

Such attacks such as distributed denial of service known (DDoS) cyberattacks often bombard websites with traffic of the company by a large number of devices.

The bombing of the pages in this way, it is locked.

"False Guide management applications that usurped the identity game for two main reasons, the researchers said.

"First, applications are very popular leader monetize the success of the original game applications.

Second, "application rule requires very little development and implementation of functions.

"For malware developers is a good way to reach a wider audience with minimal effort.

Malicious applications work request from the user 'admin' permission.

If you agree, then the malware can be deleted prevented from a phone or tablet.

The new strain is called False Guide malware transferred from game manuals on the most popular mobile games, including Pokémon Go and FIFA

What are hacking the devices used?

Experts believe that hackers try to infect as many devices as possible to build a "botnet still."

Botnets consist of a network of infected machines, computers and intelligent, such as refrigerators and boilers products.

After a large number of devices, cybercriminals can launch a coordinated attack against companies or businesses.

Such attacks such as distributed denial of service known (DDoS) cyberattacks often bombard websites with traffic of the company by a large number of devices.

The bombing of the pages in this way, it is locked.

malicious software secretly records on cloud-based messaging services, send the hacker commands to the device.

In this way, the malware can get full access to a device and use it to launch a cyber attack.

"Mobile botnets are a growing trend since the beginning of last year to reach more and more sophistication and, experts say.

"This type of malware manages to infiltrate Google Play due to non-malignant nature of the first component that downloads only the actual malware.

"Users should not leave for their protection on app stores and implement additional security measures on the mobile device, such as the use [products] similar in their PC.

At the top of the download security software for their phones, users can be hacked by selective about the applications avoid download them.

Players should always check the rating of solutions and caring people all under one four-star.

In fact, often bombard increase hackers, the classification system of five-star ratings they artificially Appreciation of the application.

Read written comments to review the negative comments, is another good way to avoid fraud.

Posting Komentar untuk "Pokémon Go and FIFA guidelines false hijack 600000 androids - Daily Mail"