Close Menu
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
Facebook X (Twitter) Instagram
Trending
  • Jennifer Lopez and Ben Affleck reveal summer plans after Europe trip
  • T20 World Cup: Quiet contributions from Akshar Patel, Kuldeep Yadav and Ravindra Jadeja justify Rohit Sharma’s spin vision | Cricket News
  • The impact of a sedentary lifestyle on health
  • Bartok: The World of Lilette
  • Economists say the sharp rise in the U.S. budget deficit will put a strain on Americans’ incomes
  • Our Times: Williams memorial unveiled on July 4th | Lifestyle
  • Heatwaves in Europe are becoming more dangerous: what it means for travelers
  • Christian Science speaker to visit Chatauqua Institute Sunday | News, Sports, Jobs
Facebook X (Twitter) Instagram
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
The Daily PostingThe Daily Posting
Android

Android users should remove these malware apps as soon as possible

thedailyposting.comBy thedailyposting.comFebruary 20, 2024No Comments

[ad_1]


As reported by Bleeping Computer, the banking Trojan Anatsa is running rampant on smartphones in Europe. We’ve seen Anatsa plaguing smartphones in the past as well, but this particular his Anatsa campaign has targeted the UK, Germany, Spain, Slovakia, Slovenia, and the Czech Republic, and in November he announced that ThreatFabric was first detected by researchers.

Anatsa has since infected at least 150,000 smartphones, but researchers estimate that number could reach 200,000. The bad guys behind malware droppers (apps designed to deliver malware) have also gotten smarter by putting malicious software into apps designed to appear in the top three of the Play Store’s “Top New Free” category. Attached is: When an app appears here, more users may be tempted to try it out, potentially increasing the number of victims infected with the malware.

How does Anatsa work?

When you install the Anatsa app on your smartphone, it covers Android’s accessibility services features. This service is designed to make Android more accessible to the widest range of users, regardless of ability, but it also allows malicious software to be installed in the background without your knowledge. As a result, it has become an entry point for many types of malware. .

Google targets this kind of accessibility service abuse, and malware finds a way. This time, these Anatsa apps were able to get by by offering a bogus “battery-draining hibernated apps” feature. End users think they are enabling the ability for a particular app to sleep in the background, but they are actually giving the Anatsa app permission to use accessibility services.

When you enable accessibility services on your app, specific pieces of malicious code are downloaded instead of the entire malicious code. This is to make it less noticeable. If an app ingests all the malicious code at once, Android might notice and terminate the process. The dropper then downloads a file containing malicious code that is used to install the actual malware on your device. From here, the app downloads a file containing a link to the malware. Finally, the malware is downloaded to your phone and launched.

Anatsa is a banking Trojan, meaning it is designed to steal banking information, including bank login details. Malicious actors can use this data to steal money or personal information, making this a particularly nasty form of malware.

Which apps contain Anatsa malware?

According to our research, 150,000 (or 200,000) downloads of Anatsa in Europe were caused by five apps:

  1. Phone Cleaner – File Explorer

  2. PDF Viewer – File Explorer

  3. PDF reader – viewer and editor

  4. Phone Cleaner: File Explorer

  5. PDF reader: file manager

Of course, if you remember any of these names and have these apps installed on your device, remove them as soon as possible. Fortunately, they are no longer available for download. Google has removed them from the Play Store. However, that alone will not remove them from the device where they are installed. So, even if you don’t live in a targeted country, make sure you’re not running these apps.

How to protect yourself from malware droppers

Apps containing malware and malware installation instructions are devising new ways to trick users into downloading it. However, there are some general best practices you can adopt to protect yourself in the future.

First, avoid apps that claim to improve your phone’s performance or quality, unless they’re a well-known name with a huge following. Malicious users know that customers are looking for these types of apps and design their droppers to look like them.

If you’re starting to get skeptical about these apps, take a closer look at their Play Store pages as well. Make sure your copy is well-written and free of simple spelling or grammar mistakes. Genuine apps usually take care to do these things correctly. Additionally, make sure your images are of high quality and really showcase what the app itself is promoting.

Finally, scroll down and check out the reviews. Check the recent and most critical reviews to see if anyone is complaining that this app has made their phone run worse. Be careful, as some people may actually call the app to install malware. If a review seems wrong, or if there have been reviews of a seemingly different app in the past, it’s best to not bother with that app in the first place.



[ad_2]

Source link

thedailyposting.com
  • Website

Related Posts

Qualcomm wants to make it easier for phone makers to issue Android updates

June 28, 2024

Qualcomm wants to make Android updates easier for OEMs

June 28, 2024

What’s new in the June 2024 Google system update for Android

June 28, 2024
Leave A Reply Cancel Reply

ads
© 2025 thedailyposting. Designed by thedailyposting.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms of Service
  • Advertise with Us
  • 1711155001.38
  • xtw183871351
  • 1711198661.96
  • xtw18387e4df
  • 1711246166.83
  • xtw1838741a9
  • 1711297158.04
  • xtw183870dc6
  • 1711365188.39
  • xtw183879911
  • 1711458621.62
  • xtw183874e29
  • 1711522190.64
  • xtw18387be76
  • 1711635077.58
  • xtw183874e27
  • 1711714028.74
  • xtw1838754ad
  • 1711793634.63
  • xtw183873b1e
  • 1711873287.71
  • xtw18387a946
  • 1711952126.28
  • xtw183873d99
  • 1712132776.67
  • xtw183875fe9
  • 1712201530.51
  • xtw1838743c5
  • 1712261945.28
  • xtw1838783be
  • 1712334324.07
  • xtw183873bb0
  • 1712401644.34
  • xtw183875eec
  • 1712468158.74
  • xtw18387760f
  • 1712534919.1
  • xtw183876b5c
  • 1712590059.33
  • xtw18387aa85
  • 1712647858.45
  • xtw18387da62
  • 1712898798.94
  • xtw1838737c0
  • 1712953686.67
  • xtw1838795b7
  • 1713008581.31
  • xtw18387ae6a
  • 1713063246.27
  • xtw183879b3c
  • 1713116334.31
  • xtw183872b3a
  • 1713169981.74
  • xtw18387bf0d
  • 1713224008.61
  • xtw183873807
  • 1713277771.7
  • xtw183872845
  • 1713329335.4
  • xtw183874890
  • 1716105960.56
  • xtw183870dd9
  • 1716140543.34
  • xtw18387691b

Type above and press Enter to search. Press Esc to cancel.