This malware then deletes its app icon and runs persistently in the background, restarting itself every time the infected phone boots up. Once an infected app is installed, SimBad opens a backdoor on the phone and installs additional malware. However, what the developers don’t realize is that the malicious platform is actually piggy-backing their apps to evade the Google Play Store’s app scanning system. The malware, dubbed as SimBad, apparently sneaks into apps by inserting itself into Software Development Kits (SDK) and by presenting itself to developers as a legitimate ad-serving platform. Most of the apps appear to be mostly simulations games but some are a mish-mash of utilities like photo editors and browsers. The combined download total of all the apps? More than 150 million. Security researchers at Check Point discovered a new kind of Android malware disguised as an advertising platform and it is believed to be infecting more 200 apps in the official Google Play.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |