How to deal with Android shutdown and hijacking of malware?

Source: Internet
Author: User
Tags root access

How to deal with Android shutdown and hijacking of malware?

At the beginning of the new year, a piece of news came out in the security industry: A new Android malware is determined to steal all your secrets and identities, write down your every action and take a video, it may even steal your child before birth. This malicious software is called Shutdown Hijack (PowerOffHijack, or Shutdown Hijack in some circles ). It was discovered by AVG, a antivirus software company. Theoretically, it may be very dangerous. However, in most cases it is not very dangerous.

The following describes the malware. Once it enters your device, it will hijack the shutdown process and make you mistakenly think that the mobile phone has been disabled (or even play the shutdown animation to convince you that everything is okay ). Once the device is shut down, the malware calls to send messages, take photos, and execute more tasks.

Important information about the malware is as follows:

• The malware only appears in app stores outside Google Play Store;

• This malware can only affect Android systems with versions earlier than version 5;

• The malware must have root access to its role.

AVG has claimed that it is the only way to remove the battery if you are sure your phone is shut down. Of course, this does not apply to a lot of Android devices (such as Motorola Moto X and HTC M8) that cannot even remove the battery ). On the AVG blog (http://now.avg.com/malware-is-still-spying-on-you-after-your-mobile-is-off/), they gave a very detailed introduction to how the malware works, using specific code snippets to elaborate on the process. They did mention that the malware originated from China, where more than 10000 devices are said to have been infected. AVG did not mention the websites on which the malware was downloaded or the applications on which the malware was hidden.

The principle behind the malicious code has serious defects and even deviates from its original intention. Considering that few people actually turn off mobile devices, this type of threat is almost no problem. Yes, some people do occasionally close the device completely, but those people have to meet other malware design standards, including:

• Do they download applications from third-party websites?

• Are their devices cracked?

I guess the two answers are "no ". Therefore, even if you turn off your phone, this malware is unlikely to compromise your security.

However, if you really meet all those criteria (this is unlikely) and are worried that shutdown and hijacking of malware may intrude into the device, the following are the steps you need to take:

1. install an anti-malware program (my favorite is Malwarebytes, https://play.google.com/store/apps/details? Id = org. malwarebytes. antimalware), make sure you use this program.

2. delete any applications you have installed from a third-party website.

3. Uninstall all suspicious third-party applications and use Malwarebytes to scan again.

As I said before, I would like to reiterate that your security cannot fully count on Google (or any platform Developer ). If you are using a mobile device, it may be a bad situation. We are in the era of absolute security. New methods for data theft will continue to emerge. Developers on platforms such as Google, apple, and Microsoft need to be vigilant, as do consumers. At the same time, companies reporting threats (such as shutdown hijacking threats) need to report those threats responsibly (that is, "If you have not accessed a third-party Android app store, your device is unlikely to be affected by shutdown hijacking of malware ").

Ordinary consumers or users tend to neglect mobile technology. The password is weak (or not used at all); anti-malware is not installed at all; the Device is not registered with management software such as Android Device Manager. When using Android and other platforms, you must understand that the restrictions imposed by Android are not as strict as those imposed by iOS. Because of this, you must take several other preventive measures and always remember to be safe when using the device.

 

Responsibility is always accompanied by power.

Unlike working on desktops or laptops, the threat of mobile security leaks is even more disturbing. When appropriate, information that should not be disclosed may be leaked, and the victim finds it necessary to clean up a mess. Don't be such a victim! Be careful, so that android will serve you well over the years.

English: how to shutdown the android poweroffhijack

 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.