McAfee: 90% million mobile malware locked Android

Source: Internet
Author: User

According to the second-quarter Threat report released this week by McAfee, the information security vendor, Android has been the most popular platform for mobile malware writers for a few seasons. This season is no exception. A clearer indicator is, all new mobile malware are directly accurate to the Android platform, including SMS malicious programs, mobile zombie programs, spyware and Trojans.

Although the number of new mobile viruses added in the second quarter of this year is not less than 6000 in the first quarter, there are more than 4000, and less than 500 new mobile viruses appeared in the fourth quarter of last year. In addition, about 5% of mobile malware are locked for Android, and more than are targeted at the Symbian platform.

McAfee also stressed the emergence of some noteworthy mobile viruses in the second quarter, such as Android/NotCompatible. when A mobile phone user visits A malicious website, the user downloads the virus and disguise the installation name as an update kit of the Android system. Android/Twikabot. A is A zombie virus. What is novel is that the zombie virus does not connect to the network server access command, but searches the internet for the command issued by A specific Twitter account. In other words, hackers use Twitter to control these zombie viruses, and all affected devices will follow the Twitter account controlled by hackers.

Android/Moghava also appeared in the second quarter. android/Stamper. a. The function is the same as destroying the photos stored on the SD card of the mobile phone. The biggest difference is that the program uses different icons and locks different ethnic groups.

McAfee said that many Android malicious programs are very similar to PC malicious programs, which is not surprising because the malicious program author has years of experience writing malicious programs on other platforms, these malware are not conceptual verification or preliminary programs, but mature and fully functional works. Hackers clearly know that they want consumer and business data on mobile phones.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.