Just past the 2014 Mobile Internet Development Conference and the fifth session of the China Mobile Phone application Developers conference published information that the first half of China's mobile phone users will break through 600 million, Up to 605 million; mobile internet at the same time, mobile data privacy and other security concerns, mobile phone virus has been established as a threat to mobile security of the first-class killer, among the site forum, application market, ROM built into the first quarter of 2014 Chinese mobile phone virus transmission of the main source, respectively accounted for 25.6%, 23.7% and 22.1%.
The most user-friendly mobile Trojan in history--mask Spy
Mask spy through camouflage popular software, fake app updates, forged download progress bar, save useless pictures, delete the charge SMS notification, five camouflage means to become the most attention to detail, the most understand the "user experience" mobile phone Trojan. Trojan Horse first through the background ' Update ' service from the resources to read the target SMS number and send content, and start a timer service, based on the date and month inference to send SMS, every 5 minutes to execute. Mask Spy "code found in 1062999923 and 10627777555, such as SMS deduction of the SP number. Trojan by secretly to these numbers to send a deduction fee SMS to achieve the purpose of the deduction, the same time will be charged 2 yuan SMS notification screen off, the user is not aware of the whole process.
It is reported that "masked spy" in the "qq2013", "", "91 mobile phone assistant", "UC Browser" and other popular applications to deceive users after installation, will be updated to apply to the pretext of the user to install the "update program" Trojan file. After the installation is complete, the Trojan file does not have any icon, very concealed. Trojan will launch a service called "Update" and check the network status, if not turned on to remind the user to open, assuming that it is turned on will download the file to the phone SD card. During the download process, the Trojan will also forge a fictitious download progress bar, confusing the user. Love encryption security experts pointed out that once the mobile phone, SMS will be monitored by Trojan Horse, the same time hackers will control the mobile phone by SMS command, stealing the charge of SMS and other malicious acts, the user's privacy and mobile phone charges there is a huge threat.
In addition, masked spy "Trojan author also will be a larger compressed file disguised as the picture" Icon1.png ", mixed with the installation file package, so that the original installation file to achieve a small version of the file size of genuine software, to eliminate the mobile phone users to download the alert mentality.
National Mobile internet users first super 600 million virus into mobile security level killer