Detecting new malware on Android can damage phones
Unlike other malware (malware) that only steal data, when entering Android and Loapi phones, the hardware must work overload causing serious damage.
- 9 things to do when detecting a computer infected with malware
- Google discovered new Spyware on Android called Tizi
According to Kaspersky, Loapi is very flexible, both causing financial damage and destroying the device permanently.
When entering the smartphone, Loapi will download the pre-digging application and create a Monero application, a digital token to take advantage of the device's power to gain unauthorized virtual money for the attacker.
The form of device attack to take advantage of illegal virtual money laundering is called 'cryptojacking'. But Loapi differs from the usual 'cryptojacking', not only taking advantage of the device to dig out hidden money, but the malware will squeeze the Android device, causing the battery to heat up, bulge and cause other serious failures until they fail. can work anymore.
In addition, the malware also installs malicious ads, automatically downloads other applications and automatically connects SMS to send messages to high-cost numbers.
After "appropriating" the device, Loapi also used them as a 'bot' with control to deny service attacks. When thousands of manipulated 'bot' smartphones increased access to a website or network resource, it quickly collapsed.
Loapi has not yet appeared on Google Play but only on the third application store. It is often fake into adult software or antivirus software for mobile devices.
When compromised, this malicious malware will pop up a series of pop-ups, asking the victim to allow the application to run on the device. These pop-ups only appear when the victim clicks the OK button.
Once he had the system rights, Loapi started the process of taking advantage of the device to make money.
How to remove Loapi malicious code
The only way to remove this malicious malware is as follows:
- Starting the computer in Safe Mode, third-party applications will not work.
- Remove the highest administrative rights and delete the infected application by changing settings.
See more:
- Warning: The new Facebook virus, a malicious code that is spreading rapidly through Messenger
- Top 12 most dangerous backdoor in computer history
- How to remove the code as a video format on Facebook Messenger
You should read it
- Malware digs virtual money over antivirus programs, forcing Windows to crash
- CertUtil.exe allows an attacker to download malicious code and bypass antivirus software
- How does malware get into smartphones?
- Google 'purged' 24 applications downloaded nearly 500,000 times containing malicious malware
- Discover a new kind of malicious code that can record the phone call to extort money
- Malware Judy attacked more than 36.5 million Android phones
- What is Cryptojacking and how to combat this malware?
- How to remove malicious software (malware) on Android applications?
- Fileless malware - Achilles heel of traditional antivirus software
- More than 100,000 pages using Wordpress are infected with malware
- New ransomware appeared not to send Bitcoin, money, but ... nude photos !!!
- 9 malicious applications on Google Play, if installed, should be removed immediately