The research revealed by Trend Micro’s that mobile viruses attack is on its peak which is riskiest for android mobiles. According to a security vendor survey most of the mobiles are infected in Eastern Europe, Asia, and Latin America. All the mobiles are infected just because of downloading apps from a malicious source. Trend Micro’s also highlights the vulnerability and security flaw in Android OS, which may be used by hackers to bypass a verification check in Google play store.
|Types of malware||Ransomware, Screen locker, Spyware, Adware, Trojan, Rootkit, Rogue apps|
|Danger level||High. Most of the Android virus versions are capable of locking the screen, stealing personal data and causing money loss|
|Symptoms||Locked screen, pushy ads, encrypted files, unusual system's behavior, significant slowdown, increased telephone bill|
|Distribution method||Trojanized apps, text messages, Google Play store apps, file-sharing websites, malicious links|
|Malware list||Com.google.provision, Com.android.system.ui, Com.android.gesture.builder, Lastacloud virus, NotCompatiblev virus, Mazar malware, Smart cars-hacking Android malware, Gooligan malware, Ghost Push virus, HummingWhale virus, HummingBad virus, e, GhostCtrl virus, Invisible Man, LokiBot virus, Marcher Android Trojan, Tizi Android virus, Android Police Virus, Android ransomware, Android ransomware, Lockdroid ransomware, LeakerLocker ransomware, DoubleLocker ransomware, Matcher Trojan, Tizi spyware, vGhostCtrl, ExoBot, Xavier, 10001_1.jar, Rabbitfiles, Funnwebs.com, JavaTcmdHelper, Android ads on Lock Screen, Fake Virus Warning Android, Opt-Out virus|
Top 13 Android viruses are listed below
According to Trend Micro’s FakeInst is at the top of the list. It has infected about 22% of the total infection. FakeInst mostly spread in Eastern Europe, Asia, and in Russia. FakeInst was found in dozens of android apps that are available to download on a third-party app store which is used to send premium-rate SMS messages.
The total rate of infection of the OpFake virus is about 14% according to Trend Micro’s research. OpFake is a family of viruses that acts as a downloader in the Opera browser, an alternative to Google Chrome browser for android.
It can automatically root your device, leaving it open to a stream of adverts. It’s repackaged with legitimate apps to make it hard to catch, and it has been found pre-installed on a number of Chinese devices in the past. It’s difficult to remove it entirely, and that includes factory-resetting the device. You’ll have to root and reflash the device depending on your model and firmware which is difficult for many users. Here’s a guide if you’re thinking about getting started.
Recent Trend Micro’s research shows SNDApps comes in at 3rd no, SNDApps virus family had infected up to 12% of total mobile virus infection. SNDApps acts as spyware that uploads the private information and other details and to a remote server without the user’s permission.
Boxer is another SMS Trojan, was developed to charge more to send messages at a premium rate. Boxer family male acted as a Flash alternative for android mobile. It was also spread by the third-party app store and infect mostly in Europe and Asia, Brazil, and other Latin American countries which affected 6% of the total.
GinMaster is also known as GingerMaster comprising 6% of total malware infection and landing it to No.5 spot on Trend Micro’s list. GinMaster was attached to legitimate apps including those showing inappropriate images of women. The GinMaster installs its root shell into system partition to use the latter.
The Godless virus can be found on apps in the Play Store, which means it’s an extremely dangerous prospect. Even if you stick to the rules, there’s a chance it’ll infect your phone if you’re not careful. It’ll root your phone when the screen switches off, so you’ll probably have no way of knowing as it infects your device quietly and efficiently.
VD loader is a type of malware that is mostly detected in the Asia Region and is a type of SMS trojan. VDLoader is not easily detectable because it hides in the background of mobile Applications. This is one of the first Malwares that contains an auto-update feature and contacts remove server.
FakeDolphin is a malware that gives you a dolphin browser as an alternative for your default Google Chrome browser and this browser has a Trojan that signs up users for the services without their knowledge or consent.
KungFu is a very effective malware that tries to gain the root access of your device it is generally embedded in applications and has a backdoor functionality that allows attackers to install a malicious application package, navigate through websites and run multiple programs. It also steals your data and information that is stored in the device memory.
The Gunpoder virus is installed through third-party emulators for Nintendo consoles found outside the Play Store. Emulation is always a grey area, but it’s no reason to hack people that love older games on the go. To stay safe check reviews before downloading a random APK file from the Internet. There are a number of emulators available on the store for a price, so it’s sometimes worth paying a little extra for that added peace of mind. After all, it’s a fraction of the cost of the games themselves.
The Basebridge malware is best known for stealing sensitive data from the device and send that data to a remote to the attacker. This malware has also been detected in the Asia region and is generally found embedded in copies of popular mobile apps, sniff the victim’s messages and send them to premium-rate numbers other than that It can also block the data consumption monitoring.
JIFake is also a Basebridge malware act as a fake mobile app for JIMM which is an open-source message client service for the ICQ network. The fake app embeds a trojan to send messages to premium rate phone numbers. This Basebridge malware has commonly been detected in the eastern European region and also collects information from the users’ devices including SMS monitoring and Location data.