If victims fall for the legitimate-looking update screen and runs the installation, they have more deceptive screens to look forward to.įigure 5: Lock screen covering malicious activity Under the pretense of safety measures, the websites lure users into downloading a fake Adobe Flash Player update. It is distributed via compromised websites – adult video sites, but also via social media. The application, detected by ESET security software as Android/, tricks its victims into granting it special permissions in the Android accessibility menu and uses these to download and execute additional malware of the attackers’ choice.Īccording to our analysis, the trojan targets devices running Android, including the latest versions. Android users are exposed to a new malicious app imitating Adobe Flash Player and serving as an entrance gate for potentially any kind of dangerous malwareĪndroid users have been exposed to a new malicious app imitating Adobe Flash Player that serves as a potential entrance for many types of dangerous malware.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |