Friday, August 2, 2013

Malicious SpyPhoneWARE Disguises Itself ~ As Legit App ~ Takes Control of Your Android 😎👀😎👀😎👀😎


😎👀😎 While Android continues to go from strength to strength in offering consumers an enjoyable all-round user experience, there are some very noteworthy trade-offs when comparing with the likes of Apple’s iPhone iOS.







😎👀😎 Malicious SpyPhone Software Can Disguise Itself As A Legit App To Take Control Over Your Android Device. Malware remains a significant issue on Google’s mobile operating system, and with this week being the week of the Black Hat Security conference, new threats and possible solutions pertaining to Android security have been coming to light.



😎👀😎 One Significant Threat, outlined by Director of Kindsight Security Labs Kevin McNamee, involves the installation of a Malicious App named "SpyPhone." Once the SpyPhone App is installed onty an Android SmartPhone or Tablet, malicious Code infiltrates the Android device, and can essentially keep tabs on all of your activity, hear you, and watch you.



😎👀😎 Android malware is marginally common in the grand scheme of things, but when compared with the relatively incident-free Apple’s iOS, this does not make for particularly reassuring reading for Android users and smartphone makers.



😎👀😎 SpyPhone is a lot more prevalent in Android devices than some would give it credit for, with a recent sample of 500,000 devices by Lacoon Mobile Security showing as many as 625 Android devices were infected by this malicious software. While the software is commercial and used for all manner of purposes from nations spying to parental monitoring, McNamee and his team have written a special code enabling it to be Concealed within an App.



😎👀😎 So a perfectly legitimate Instagram or Cut The Rope APK could be manipulated to enable a hacker to spy on pretty much any aspect of your device. The code forces the App to request all permissions, leaving it with free-reign of all your contacts, messages, emails, bank accounts, you name it, the malicious code is in control of all your personal and business information.



😎👀😎 It’s rather unnerving to think how easily an intruder could get into your device’s innards by simply repackaging a common App, and while sticking to the Google Play Store, while also making sure to check for unnecessary permission requests from basic apps will probably see you home and dry, there’s no doubt that SpyPhone is one to be keeping an eye out for.



😎👀😎 The fact that it operates completely silently and in the background is perhaps the most frightening aspect of all. Therefore if you were to unwittingly install SpyPhone on your Android device, you would have no way of knowing anything was amiss until, say, your bank accounts were totally withdrawn to zero balances, or worse, your identity completely taken, and distributed to the Russian Organized Crime.



😎👀😎 An intruder would have much more luck getting their unscrupulously repackaged App, into circulation by distributing it outside of the Play Store, since Google’s monitoring channels, may pick up on a hidden or disguised SpyPhone App. With that said, it’s not beyond the realm of possibility, that such a Malware App could slip through the net.



😎👀😎 Therefore always be sure to check and on the look-out when Apps appear to be making unreasonable permissions requests upon installation.





😎👀😎 https://media.blackhat.com/us-13/US-13-Brodie-A-Practical-Attack-against-MDM-Solutions-WP.pdf







Pleased you are reading, as our readers 📚 thousands world-wide, give motivation 📢 for new topics published every day. Spread the Word 📬 to your friends, family, and associates; simply forward 📮 the link below, post it on your Facebook and Twitter Pages for their review,, anyone may subscribe, its secure, confidential, as every time 📅 I publish a story 📝 the WordPress system {not I} sends 📬 a reminder to you with a link to my new Article: http://fau4u2.wordpress.com/





Perspective: These articles are created to inform a diverse audience, whether it be photography, digital cameras, lenses, Image editing, Apps, Smartphones, iPads, iPhones, Laptops and related products, Health & Wellness, or any news-worthy topic. The purpose is to inform, from sources that are believed to be reliable, and stimulate Dialogue.





To learn more about what else we do, take a moment and visit these links, browse around. We are pleased with over 22 million visits in recent years: http://www.416-1100.com . For Health & Wellness; http://www.Jim.Wilson.Isagenix.com . If digital Imaging is of interest, I teach a course named "Principles of Digital Imaging and Post Image Processing" as an Adjunct Prof at FAU: http://www.416-1100.com/FAU-Classes/Principles-of-Digital






When I do what I do… I usually do it here.










via WordPress http://fau4u2.wordpress.com/2013/08/02/malicious-spyphoneware-disguises-itself-as-legit-app-takes-control-of-your-android-%f0%9f%98%8e%f0%9f%91%80%f0%9f%98%8e%f0%9f%91%80%f0%9f%98%8e%f0%9f%91%80%f0%9f%98/

No comments:

Post a Comment