Immediately Remove These 17 Apps From Your Phone Infected With Malware

<p class = "canvas-atom canvas-text Mb (1.0em) Mb (0) – sm Mt (0.8em) – sm" type = "text" content = "
If you think your iPhone was free to be the target of cyber attacks, you're wrong. Apple removed 17 applications from the App Store after researchers discovered they were infected with malware, which worked from a server that also affected Android devices.
"data-reactid =" 27 ">
If you think your iPhone was free to be the target of cyber attacks, you are wrong. Apple removed 17 applications from the App Store after researchers discovered they were infected with malware, which worked from a server that also affected Android devices.

<p class = "canvas-atom canvas-text Mb (1.0em) Mb (0) – sm Mt (0.8em) – sm" type = "text" content = "The applications, published by AppAspect Technologies, were detected by Wandera mobile security company. While all apps worked properly according to what they claimed to do in the app store, they also harbored some hidden dangers, such as a series of Trojan viruses and malware."data-reactid =" 28 "> The applications, published by AppAspect Technologies, were detected by the mobile security company Wandera. While all the apps worked properly according to what they claimed to do in the app store, they also harbored some hidden dangers , like a series of Trojan viruses and malware.

How does this Trojan malware work? <P class = "canvas-atom canvas-text Mb (1.0em) Mb (0) – sm Mt (0.8em) – sm" type = "text" content = "According to the researchers, the Trojan module discovered in this group of applications is designed to carry out tasks related to advertising fraud in the background, such as continuously opening web pages or clicking on links without any user interaction."data-reactid =" 30 "> As the researchers explain, the Trojan module discovered in this application group is designed to carry out tasks related to background advertising fraud, such as continuously opening web pages or clicking on links without No user interaction.

RELATED

<p class = "canvas-atom canvas-text Mb (1.0em) Mb (0) – sm Mt (0.8em) – sm" type = "text" content = "The goal of most Trojans known as clicker is to generate revenue for the attacker by paying per click, inflating website traffic. "They can also be used to drain the budget of a competitive application, by artificially inflating the balance due to the advertising network," Wandera explains. "Data-reactid =" 31 "> The objective of most Trojans known as Clicker is to generate income for the attacker by paying per click, inflating website traffic. "They can also be used to drain the budget of a competitive application, by artificially inflating the balance due to the advertising network," explains Wandera .

<p class = "canvas-atom canvas-text Mb (1.0em) Mb (0) – sm Mt (0.8em) – sm" type = "text" content = "While it is a virus, in this case the only impact for users would have been a slower performance of the phone and greater use of the internet or cellular connection. Applications were able to bypass Apple's approval process because malicious activity was occurring not within the application code, but through contact with a remote server called C&C."data-reactid =" 32 "> While it is a virus, in this case the only impact for users would have been a slower performance of the phone and greater use of the internet or cellular connection. Applications were able to bypass the process Apple's approval because malicious activity was occurring not within the application code, but through contact with a remote server called C&C.

Hidden dangers, also affecting Android <p class = "canvas-atom canvas-text Mb (1.0em) Mb (0) – sm Mt (0.8em) – sm" type = "text" content = "However, this same server was previously reported as part of a Trojan malware campaign. clicker Very similar, which attacked Android devices."data-reactid =" 34 "> However, this same server was previously reported as part of a very similar Trojan clicker malware campaign, which attacked Android devices.

<p class = "canv as-atom canvas-text Mb (1.0em) Mb (0) – sm Mt (0.8em) – sm" type = "text" content = "According to the investigation, the C&C server was used to communicate commands to infected applications that could trigger targeted advertising, as well as silent loading of websites and remote reconfigurations on the device. An example involved users who had been fraudulently subscribed to expensive content services after the installation of an application infected with malware.

"data-reactid =" 35 "> According to the investigation, the C&C server was used to communicate commands to infected applications that could trigger targeted advertising, as well as silent loading of websites and remote reconfigurations on the device. An example involved users who had been fraudulently subscribed to expensive content services after installing an application infected with malware.

<p class = "canvas-atom canvas-text Mb (1.0em) Mb (0) – sm Mt (0.8em) – sm" type = "text" content = "In addition, Android applications that communicated with the same server collected private information from the user's device, such as the brand and model, the user's country of residence and various configuration details."data-reactid =" 36 "> In addition, Android applications that communicated with the same server collected private information from the user's device, such as the brand and model, the user's country of residence and various configuration details.

Infected applications <p class = "canvas-atom canvas-text Mb (1.0em) Mb (0) – sm Mt (0.8em) – sm" type = "text" content = "This is the list of applications for malware-infected iPhone applications that were discovered so far. All of them come from the same developer, known as AppAspect. Wandera's team explains that it tested all of the developer's free iTunes applications and the results show that 17 of the 35 free applications are infected with the same malicious clicker functionality and communicate with the same server."data-reactid =" 59 "> This is the list of malware-infected iPhone applications that were discovered so far. They all come from the same developer, known as AppAspect. Wandera's team explains that it tested all applications Free iTunes from the developer and the results show that 17 of the 35 free applications are infected with the same malicious clicker functionality and communicate with the same server.

If you have any of the apps mentioned in this list on your iPhone, it is recommended to uninstall them immediately.

RTO Vehicle Information EMI Calculator & Loan PlannerFile Manager – DocumentsSmart GPS SpeedometerCrickOne – Live Cricket ScoresDaily Fitness – Yoga PosesFM Radio PRO – Internet RadioMy Train Info – IRCTC & PNRAround Me Place FinderEasy Contacts Backup ManagerRamadan Times 2019 ProRestaurant Finder – Find FoodBMT Calculator PRO – BMR CalD PRO – Accounts ProVideo Editor – Mute VideoIslamic World PRO – QiblaSmart Video Compressor <p class = "canvas-atom canvas-text Mb (1.0em) Mb (0) – sm Mt (0.8em) – sm" type = "text" content = "The security firm notes that, although it found 17 AppAspect applications that were infected by malware, the developer currently has several other applications in the App Store, both free and for sale, in which no problems were discovered. & Nbsp; & nbsp ;"data-reactid =" 79 "> The security firm notes that, although it found 17 AppAspect applications that were infected by malware, the developer currently has several other applications in the App Store, both free and for sale, in the which no problems were discovered.

<p class = "canvas-atom canvas-text Mb (1.0em) Mb (0) – sm Mt (0.8em) – sm" type = "text" content = "It is also no secret that malicious applications have been a constant problem for Google. After more than twenty apps were removed from the Google Play Store in September after they were found to contain malware, it was now revealed that another 42, which added eight million downloads, were infected with malicious adware in a campaign that lasted more than a year. "data-reactid =" 80 "> It is also no secret that malicious applications have been a constant problem for Google. After more than twenty apps were removed in September of the Google Play Store after it was discovered that they contained malware, it was now revealed that another 42, which added eight million downloads, were infected with malicious adware in a campaign that lasted more than a year.

SEARCH FOR MORE

YOU MAY ALSO LIKE