“With this malware affecting so many devices running such a large portion of the Android operating system it’s imperative that you check to see if you have already been infected. So many users do not see the same dangers when comparing mobile devices and desktop machines that often the perception of danger is massively reduced.
Mobiles these days are a very integral part of our lives and quite often once the technology is embraced we strive to do more and more on the move. This particular malware enables an attacker to completely compromise the account allowing the new owner to have total root access enabling them to virtually do as they please on the victim’s device. Google are already working hard to limit the damage caused by this but you should check to see if your device has already been affected.
Checkpoint have set up a link ) to enable you to do this with little effort. If you find out your account has been compromised the best option is a clean install of your mobile device, and certainly change your Google account passwords as a matter of urgency.”
“Root access like this gives an attacker a massively escalated set of privileges.Combine this with the fact the malware has been in the wild for a few months and the sensitivity of data now held on phones, and it is a worrying threat. Given it can scrape information from the plethora of Google cloud services, anyone affected should change their passwords and get their phone flashed immediately.This is one which needs to be obliterated from your device at the deepest level.”
ISBuzz Team embodies the collaborative efforts of the dedicated staff at Information Security Buzz, converging a wide range of skills and viewpoints to present a unified, engaging voice in the information security realm. This entity isn't tied to a single individual; instead, it's a dynamic embodiment of a team diligently working behind the scenes to keep you updated and secure. When you read a post from ISBuzz Team, you're receiving the most relevant and actionable insights, curated and crafted by professionals tuned in to the pulse of the cybersecurity world. ISBuzz Team - your reliable compass in the fast-evolving landscape of information security
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.