Mobile phone series Trojan frequency "eavesdropping on the storm" how to deal with

Source: Internet
Author: User

In the era of information transparency in the mobile Internet, user privacy has become the most sensitive topic in the public. With the growing popularity of Android, there are more and more "black hands" reaching out to Android users. Many applications steal users ' privacy without their knowledge, and upload them to related servers in real time. A humble mobile phone software allows you to do everything in the hands of others.

Recently, the domestic mobile anti-virus software-security Butler intercepted the "eavesdropping storm" series of Trojans, the Trojan is more unique, will be privately to monitor the mobile phone, greatly enhance the threat of user privacy. According to the An Tiuyun Security Center detection analysis, the current virus has infected nearly million mobile phone users.

Trojan Horse Behavior Analysis:

Behavior one, the Trojan is impersonating system components; boot from boot; no startup icon and startup interface; After installation, start the service privately in the background.

Act two, privately to mobile phone calls, SMS listening: When the mobile phone received a text message to read the message content, and write to the software with the database, listening to the status of the caller, under certain conditions triggered the recording behavior.

Behavior III, upload data (SMS and listen to data, etc.) to the specified server address. Trojan Author is fully prepared for the upload of privacy data, preset 4 server addresses, including a dynamically replaceable address.

Security Butler's Weapon:

Mobile security experts predict that in the future there will be more such or variant behavior of the virus, please early to defend the killing. Security Butler has achieved the "eavesdropping storm" series of precision killing Trojan, users can download the installation from the official website, and then use a quick scan or the whole killing, you can phone hidden virus to killing.

In addition, Android mobile phone users should develop a good mobile phone security awareness, in the download application must be vigilant, recommended to large, regular security mobile phone application store or forum to download, to prevent the mobile phone by Trojans, viruses steal privacy.

This article comes from the Http://www.mkddos.com/zixun/2012/1101/21.html DDoS Group specializes in providing DDoS attackers, DDoS attack software, DDoS attack tools and tutorials, as well as traffic attackers, web site attackers to download

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.