Close Menu
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
Facebook X (Twitter) Instagram
Trending
  • Jennifer Lopez and Ben Affleck reveal summer plans after Europe trip
  • T20 World Cup: Quiet contributions from Akshar Patel, Kuldeep Yadav and Ravindra Jadeja justify Rohit Sharma’s spin vision | Cricket News
  • The impact of a sedentary lifestyle on health
  • Bartok: The World of Lilette
  • Economists say the sharp rise in the U.S. budget deficit will put a strain on Americans’ incomes
  • Our Times: Williams memorial unveiled on July 4th | Lifestyle
  • Heatwaves in Europe are becoming more dangerous: what it means for travelers
  • Christian Science speaker to visit Chatauqua Institute Sunday | News, Sports, Jobs
Facebook X (Twitter) Instagram
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
The Daily PostingThe Daily Posting
Android

Samsung, Pixel, Xiaomi issue ‘update now’ warning to millions of users

thedailyposting.comBy thedailyposting.comJune 20, 2024No Comments

[ad_1]

Samsung and other Android users warned to update now due to RAT attack

SOPA Images/LightRocket via Getty Images

Have you updated the software on your Samsung, Pixel or Xiaomi smartphone recently? If you haven’t, it’s time to look away now: Check Point’s cyber team has published a new report warning you about how big a risk updating can put you at and urging you to do so.

The researchers say they’ve tracked the Rafel RAT in the US, UK, China, Indonesia, Russia, India, France and Germany, detecting 120 dangerous campaigns over the past two years, which they warn is a reminder of “how much damage open-source malware techniques can cause, especially when targeting a large ecosystem like Android, which has over 3.9 billion users worldwide.”

And this RAT is particularly nasty, one you definitely don’t want on your phone: it sifts through all your personal data and sends whatever it wants back to its handlers without you realizing it, at least until it’s too late. “Our findings reveal that most of the victims used Google (Pixel, Nexus), Samsung Galaxy A & S series, and Xiaomi Redmi series,” Check Point said. But many other devices were also affected.

ForbesNew Google Chrome warning – Do not copy and paste this textby Zach Doffman

“It’s important to keep devices up to date with the latest security fixes, or replace them if they no longer receive patches,” said Check Point’s Alexander Chaylitko. “High-profile threat actors and even APT groups are constantly looking for ways to leverage easily available tools, especially such as the Rafel RAT, to exfiltrate sensitive data, leak two-factor authentication codes, conduct surveillance attempts, and leverage activity that could lead to covert operations.”

Rafel targets phones through installations from outside the Play Store, and while Google has been beefing up its defenses against these “non-Play Store apps,” the scale of the problem is massive. The company reports that its new real-time code-level scanning has “already detected over 5 million new malicious non-Play Store apps, helping to protect Android users around the world.”

Some of these threats are clearly more dangerous than others. “Rafel has all the essential functionality needed to effectively execute an extortion scheme,” Check Point says. “Once the malware has gained device administrator privileges, it can change the lock screen password. [and] Prevents malware from being uninstalled. If a user attempts to revoke administrative privileges for an application, the password is immediately changed and the screen is locked, preventing any attempted intervention.”

Check Point reports that 87% of the infections it detected occurred on phones running older, unsupported versions of Android, “but users of current versions of Android should be concerned, as this Android threat can infect a wide range of versions of Android, from the oldest unsupported versions to the most current versions.”

This means that even if you’re using Android 14, you’ll need to keep your phone patched as security updates are released on a regular basis. This month we saw Google address a vulnerability in the Pixel that had previously been exploited in the wild, so you can never be complacent when it comes to Android and malware.

The team captured the Rafel RAT, which performs remote surveillance, data exfiltration and ransomware, “tricking” victims into downloading apps from outside the Google Play Store ecosystem that impersonate popular social media services, including some major brand names. Simply put, sideloading apps onto a phone running an older version of Android is like playing Russian roulette with multiple bullets in a gun – the chances of failure are dangerously high.

Raphel RAT Threat Menu

Checkpoint

The social engineering behind these attacks relies on an increasingly common form of deception – impersonating popular apps to encourage installation. Some of the apps that the Rafel RAT impersonates include WhatsApp and Instagram, which are installed on most of the targeted devices. Once installed, the RAT requests various permissions to access sensitive apps and services such as contacts, call history, and most importantly, text messaging, which allows the RAT to bypass 2FA security measures.

The RAT is programmed to retrieve contact lists, SMS messages, device information, location data, screenshots and send them to a control server. It can also wipe data from the phone, display fraudulent system messages, delete files and directories, and retrieve data and files stored on the device and transfer them to a handler.

Check Point advises users to “be wary of links or applications sent from unknown senders or downloaded from unknown websites.” For those worried they may have downloaded something they shouldn’t, the team suggests “looking out for unusual behavior on your device, such as unexpected battery drain, increased data usage, or the presence of unfamiliar apps.”

One of the main differences between Android and iPhone is the flexibility to sideload apps from third-party stores and the web. Restricting this freedom doesn’t lead to much good, but it remains the most likely cause of malware infection.

ForbesApple’s new security update exposes Samsung’s biggest AI problemby Zach Doffman

With this in mind, it’s no surprise that Google is making it harder than ever for bad actors to trick users into installing risky apps. Play Protect has been strengthened in Android 15 to scan app behavior in real time and report issues, even if you’ve never seen a particular malware variant before. Google also announced new biometric/PIN requirements for the initial installation of potentially risky apps.

None of this helps users with older, unsupported phones. And the scale of the problem is staggering. Bitdefender states, “Nearly one-third of Android smartphones worldwide run an older, unsupported operating system. Whenever a new vulnerability surfaces, regardless of platform, the first advice is always the same: apply the latest security patches as soon as possible. However, for Android devices running an unsupported operating system, this isn’t an option.”

That’s over a billion devices, and Bitdefender warns that “attackers know the statistics.” So the golden rule applies to everyone, but it applies doubly if you’re playing the dangerous game of storing your personal data on an unsupported phone.

  1. Only use official app stores, do not use third-party stores, and do not change your device’s security settings to load the app.
  2. Check the app description to see who the developer is – is this someone you want in your life? Also, check the reviews – does it seem genuine or like a rip-off?
  3. Don’t grant apps permissions they don’t need: A flashlight or stargazing app doesn’t need access to your contacts or phone, and don’t grant them Accessibility permissions that make it easier to control your device unless they need to.
  4. I never have Until now Always use the app store for installations and updates instead of clicking links in emails or messages to directly download apps or updates.
  5. Don’t install apps that link to existing apps like WhatsApp unless you’re absolutely sure they’re legitimate – check reviews and online articles.

[ad_2]

Source link

thedailyposting.com
  • Website

Related Posts

Qualcomm wants to make it easier for phone makers to issue Android updates

June 28, 2024

Qualcomm wants to make Android updates easier for OEMs

June 28, 2024

What’s new in the June 2024 Google system update for Android

June 28, 2024
Leave A Reply Cancel Reply

ads
© 2025 thedailyposting. Designed by thedailyposting.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms of Service
  • Advertise with Us
  • 1711155001.38
  • xtw183871351
  • 1711198661.96
  • xtw18387e4df
  • 1711246166.83
  • xtw1838741a9
  • 1711297158.04
  • xtw183870dc6
  • 1711365188.39
  • xtw183879911
  • 1711458621.62
  • xtw183874e29
  • 1711522190.64
  • xtw18387be76
  • 1711635077.58
  • xtw183874e27
  • 1711714028.74
  • xtw1838754ad
  • 1711793634.63
  • xtw183873b1e
  • 1711873287.71
  • xtw18387a946
  • 1711952126.28
  • xtw183873d99
  • 1712132776.67
  • xtw183875fe9
  • 1712201530.51
  • xtw1838743c5
  • 1712261945.28
  • xtw1838783be
  • 1712334324.07
  • xtw183873bb0
  • 1712401644.34
  • xtw183875eec
  • 1712468158.74
  • xtw18387760f
  • 1712534919.1
  • xtw183876b5c
  • 1712590059.33
  • xtw18387aa85
  • 1712647858.45
  • xtw18387da62
  • 1712898798.94
  • xtw1838737c0
  • 1712953686.67
  • xtw1838795b7
  • 1713008581.31
  • xtw18387ae6a
  • 1713063246.27
  • xtw183879b3c
  • 1713116334.31
  • xtw183872b3a
  • 1713169981.74
  • xtw18387bf0d
  • 1713224008.61
  • xtw183873807
  • 1713277771.7
  • xtw183872845
  • 1713329335.4
  • xtw183874890
  • 1716105960.56
  • xtw183870dd9
  • 1716140543.34
  • xtw18387691b

Type above and press Enter to search. Press Esc to cancel.