Android says goodbye to April with two threats
April 27, 2016 at 5:00 p.m.
On other occasions we have told you the different types of malicious elements that are created against Android. Adware, the most common malware or viruses and Trojans, are just some of the enemies that the world's most used software must face. A few weeks ago we estimated these threats at approximately two million, of which only a few manage to make the leap to users and that for the most part, they are intercepted in time by the developers or end up having a very limited impact thanks to the updates in security matters that are carried out periodically in this operating system.
In March we witnessed the appearance of several virus that focused on identity theft or sensitive information and, on the other hand, of harmful elements that made mere transmission channels or back doors through which other objects that were really harmful in our tablets and smartphones. Although April has been very quiet in terms of security for Android, the month says goodbye with two threats of which we give you more details and of which we also tell you how to prevent them and deal with them if they are attacked by them.
Infected terminal just by pressing
With the improvement in security measures that have brought the latest versions of Android such as the biometric markers which rely on elements such as our fingerprints to protect devices, other more sophisticated ways of attacking them also appear. In this case we talk about a virus whose operation is simple: When browsing the Internet, if press To close or access some type of ad, we involuntarily enter a malicious web page. Through it, the hacker manages to reach our terminal and in addition to obtaining our personal data, information about the device or possessing the ability to steal the contents from our galleries, you also acquire administrator permissions, with which you can adjust the security settings of our tablet at will but also, control it remotely.
The most exposed terminals they are the ones that have the versions of Android between 2.2 and 4.4. At first glance, this may not seem to affect many users if we consider that the oldest one is already only 0.1% of all the devices that run with the green robot software. However, the number of exposed models is higher as they have newer versions, since the share of 4.4 to January 2016 was approximately 35% of the total. The best way to prevent the attack of this virus is simple: To update to Lollipop or later, if possible and if this function is not available, periodically check the installed applications, manage permissions that we grant to these and as always, have a good antivirus.
The return of ransomware
The hijacking of our devices is one of the most recently used hacking methods by hackers Since with ransomware, they can demand economic bailouts to get the terminals back to normal and continue enjoying them. In this case, we talk about an element that jumped into the operating system a few days ago and whose main victims, once again, become tablets and smartphones equipped with Android 4.4. The way to attack this element is very simple again: Visiting a malicious website, malware is automatically inserted into the infected model. Once this is achieved, acquires administrator permissions and then we receive messages that we demand payment of amounts around 200 euros to break free the devices.
In case of being attacked, the best action we can take is do not pay the amount That is required of us. The restore settings From the factory on our part it is the best remedy to eliminate it and in most cases, it can be easily done. On the other hand, to prevent, the most advisable is to navigate only by trusted websites, be equipped with good antivirus and filters and perform periodic backups.
As you have seen, Android remains the target of cybercriminals. However, this does not mean that the software of the green robot is a strain of viruses since, as we have mentioned on other occasions, although they can infect millions of devices, most are eliminated before causing more damage. After knowing more about the two threats with which April is dismissed in this software, do you think that they can be really dangerous and that they can cause damage such as those exposed in summer 2015 to more than 90% of all terminals, or nevertheless, do you think that with common sense on the part of the users, and the action of the developers, these elements will not give too many problems? You have available more related information such as, for example, a list with false myths and security beliefs surrounding this interface so that you know more about everything that surrounds Android.