"Find Your Sister" "Lily Nets" by the Android Trojan infection

Source: Internet
Author: User
Morning News (reporter Han Yuanjia) Tencent Mobile Security Laboratory released the "July 2013 mobile Security Report" shows that in the next generation of 4G mobile networks, users are more vulnerable to mobile phone viruses, malicious programs and advertising program attacks, mobile phone privacy leakage, flow charges, such as the consumption of a series of security issues will be more prominent. In July 2013, Tencent Mobile Security lab, based on Tencent's mobile butler service, intercepted a total of 94,029 virus packets, of which the Android system intercepted 90,989 virus packets, and the 96.7%,symbian system, which accounted for the total number of Android virus packets, intercepted 3,040 virus packets. The report argues that, because of the 4G network environment, the rapid speed of the download speed of smartphones, high-speed network transmission means that users stored on the phone's privacy information is more likely to be quickly uploaded to steal, so these viruses will cause greater harm to the vast number of users. With the development of 4G network, app developers compete for users more and more fiercely, the way of profit is still single, in addition to the current mobile app industry lack of supervision, promotion mode and management mechanism is still not very sound, in this case, there will be the production of drug-making or the living space and soil. July 2013, in the most infected users of the top ten viruses, a variety of virus types have the characteristics of malicious promotion, silent installation promotion software, the background of the download of unknown software, such as series of virus behavior has become very common. And in the absence of regulatory electronic markets, mobile forums and other channels have been emerging a large number of embedded "malicious advertising plug-ins and download Software" code "pirated Applications", these pirated applications disguised as popular software to lure users to download installation, and then in the user's mobile phone notification bar pop-up ads and other consumption of traffic, damage the interests of users. It is noteworthy that, at the end of July this year, the National Internet Emergency Center released information that the Android operating system has a signature verification bypass the high-risk vulnerability is masterkey vulnerability, the use of the signature loophole that Masterkey vulnerability of the toll Trojan further flooding, can be parasitic in the normal app, And the current lack of regulation of an electronic market there are 6,644 genuine app embedded Trojan program. Tencent Mobile Security Laboratory statistics results show, find your sister, navigation dog, Lily nets, sky-wing broadband and many other well-known software has been infected.
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.