![]() This malware then deletes its app icon and runs persistently in the background, restarting itself every time the infected phone boots up. ![]() Once an infected app is installed, SimBad opens a backdoor on the phone and installs additional malware. However, what the developers don’t realize is that the malicious platform is actually piggy-backing their apps to evade the Google Play Store’s app scanning system. ![]() The malware, dubbed as SimBad, apparently sneaks into apps by inserting itself into Software Development Kits (SDK) and by presenting itself to developers as a legitimate ad-serving platform. Most of the apps appear to be mostly simulations games but some are a mish-mash of utilities like photo editors and browsers. The combined download total of all the apps? More than 150 million. Security researchers at Check Point discovered a new kind of Android malware disguised as an advertising platform and it is believed to be infecting more 200 apps in the official Google Play.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |