Android Bootkit Turns Phones Into Malware Zombies

By

AVG Technologies has just released its Q2 2012 Threat Report, which identified mobile apps and social engineering as the most prevalent means for delivering malicious content.

Specifically, cybercriminals have created the first Android bootkit which turns phones with the Android operating system into ‘zombies’, meaning they come fully under the control of the cybercriminal. Cashing in on the application craze, this ‘DKFbootkit’ malware tricks users by masquerading as legitimate applications (i.e. Angry Birds Space) available for Android smartphones, and poses a serious threat to the many Android phone users worldwide.

Additionally, cybercriminals are still taking advantage of consumer’s curiosity as last year’s LizaMoon SQL mass-injection received an update and is now hidden inside celebrity sex videos and false security alerts. The threat report and a full-size version of the threat report infographic shown are available at the link below.

Top five tips to keep your Android smartphone and computer safe:

1 Prior to installing any application, carry out a background check on the developer and application, looking at ratings, reviews, history. Only download from application stores, sites and developers you trust or set your device to download only from Google Play.
2Think before you click ‘OK’ to any requests your phone or PC make for your permission. Check if it seems bona fide or whether it appears odd that the application should be asking for permission or to execute a download.
3 Keep your computer programs, such as Adobe Acrobat and Adobe Reader, up-to-date so you are not tempted to follow prompts to upgrade when trying to access content from the web.
4 Install and keep updated antivirus security software on your computer and your smartphone. This will work as your eyes and ears to keep your personal information safe and ensure your peace of mind at home and on the move.
5 Monitor your mobile phone bills very carefully if you notice any small amounts you cannot account for, investigate further and if you suspect your smartphone has been exploited, run a genuine security product to find and remove any malware.

Comments are closed.