contador javascript Saltar al contenido
Contact :

Russian artillery against malware


Russian artillery against malware

Written by

September 29, 2015


The security and privacy of users when using their devices, have become a key element that software developers and device manufacturers themselves must take into account. Therefore, most firms try to improve these aspects with each new release.

The big American, European and Asian brands usually fill the current situation in the field of technology with their products and in many cases, they also unleash the controversy when information about safety or manufacturing failures of their devices is published. However, other less known companies are strongly committed to the safety of their users. In this case we talk about Oysters, a Russian firm that takes the protection of its customers very seriously.

The T104 model

This terminal, launched by the Russian firm, It is the first one that includes a firmware capable of identifying and deleting malicious files from the device. Although it is mainly marketed in Russia, it is available in Europe on the MediaMarkt chain.

The Trojan War

The problem that the firm’s researchers have found on their devices, It is a hidden Trojan in the file of an app called GoogleQuickSearchBox. This object, which is an old acquaintance in Android systems, collects all the personal information of the user that is in the infected device such as the list of installed applications or IP addresses of the device.

Android-malware "width =" 690 "height =" 335 "srcset =" 690w, uploads / 2015/09 / Android-malware-300x146.jpg 300w, 656w, uploads / 2015/09 / Android-malware-634x308.jpg 634w "sizes =" (max-width: 690px) 100vw, 690px "/></p><h2>The user, helpless</h2><p>Although the main mission of this malware is to obtain as much information as possible from the user and steal important files to send them to a server later, one of the big problems that causes this file is that while it acts,<strong> The user does not know that they are taking away very valuable information. Therefore, he does not know when or how he should act.</strong></p><h2>The solution?</h2><p><strong>The device developers themselves claim that the only action the consumer can do to eradicate this Trojan is to completely restart the device and the operating system.</strong> This increases the loss of stored content but also ensures that no more information is stolen. Oysters recommends contacting them if they are the victim of one of these thefts on one of their devices.</p><p><img class=