contador javascript Skip to content
Contact :

Android says goodbye to April with two threats


Android says goodbye to April with two threats

Written by

April 27, 2016

android malware

On other occasions we have told you the different types of malicious elements that are created against Android. Adware, the most common malware or viruses and Trojans, are just some of the enemies that the world's most used software must face. A few weeks ago we estimated these threats at approximately two million, of which only a few manage to make the leap to users and that for the most part, they are intercepted in time by the developers or end up having a very limited impact thanks to the updates in security matters that are carried out periodically in this operating system.

In March we witnessed the appearance of several virus that focused on identity theft or sensitive information and, on the other hand, of harmful elements that made mere transmission channels or back doors through which other objects that were really harmful in our tablets and smartphones. Although April has been very quiet in terms of security for Android, the month says goodbye with two threats of which we give you more details and of which we also tell you how to prevent them and deal with them if they are attacked by them.


Infected terminal just by pressing

With the improvement in security measures that have brought the latest versions of Android such as the biometric markers which rely on elements such as our fingerprints to protect devices, other more sophisticated ways of attacking them also appear. In this case we talk about a virus whose operation is simple: When browsing the Internet, if press To close or access some type of ad, we involuntarily enter a malicious web page. Through it, the hacker manages to reach our terminal and in addition to obtaining our personal data, information about the device or possessing the ability to steal the contents from our galleries, you also acquire administrator permissions, with which you can adjust the security settings of our tablet at will but also, control it remotely.

root android

The most exposed terminals they are the ones that have the versions of Android between 2.2 and 4.4. At first glance, this may not seem to affect many users if we consider that the oldest one is already only 0.1% of all the devices that run with the green robot software. However, the number of exposed models is higher as they have newer versions, since the share of 4.4 to January 2016 was approximately 35% of the total. The best way to prevent the attack of this virus is simple: To update to Lollipop or later, if possible and if this function is not available, periodically check the installed applications, manage permissions that we grant to these and as always, have a good antivirus.

android apps permissions

The return of ransomware

The hijacking of our devices is one of the most recently used hacking methods by hackers Since with ransomware, they can demand economic bailouts to get the terminals back to normal and continue enjoying them. In this case, we talk about an element that jumped into the operating system a few days ago and whose main victims, once again, become tablets and smartphones equipped with Android 4.4. The way to attack this element is very simple again: Visiting a malicious website, malware is automatically inserted into the infected model. Once this is achieved, acquires administrator permissions and then we receive messages that we demand payment of amounts around 200 euros to break free the devices.

ramsonware android notice