Malicious code appeared on 3,000 HTC Magic smartphones
According to the Mariposa Working Group, the malware is called ' Mariposa ', since it has spread rapidly and invaded over 12 million personal computers first discovered in March 2009.
This is the result of a study by the Mariposa Working Group, which includes security agencies (DI), Georgia Technology Security Center (GTISC) and security firm Panda Security, who have researched and found out what kind of malware appears on SD cards along with smartphones installed Android HTC Magic operating system.
Although, experts say this concern will not jeopardize the Android HTC Magic phones. However, it can still appear on a user's computer when you are using a new phone connection like the Android HTC Magic distributed by, experts warn.
A senior employee of security firm Panda Security discovered them for the first time last month, so far it is estimated that over 3,000 Vodafone smartphones are infected with Conficker worms and even stolen game passwords. Lineage . etc.
The infected method almost comes from the memory card that comes with the phone, they are preloaded in malware. This is also part of the reason for the rapid development of Mariposa botnet.
Distributor Vodafone is trying to find ways to do so by sending letters to affected customers along with instructions on how to get rid of their PC's malware.
You should read it
- Virus turns iPhone into 'ghost phone'
- How to check if your Android phone is infected with Android Gooligan malware?
- Akamai: Conficker worm is still spreading
- China: Millions of computers infected with the Conficker worm
- Conficker worm still silently grows
- Which mobile phone has the most virus?
- A way to disable the Storm worm has been found
- Conficker's victim has reached 7 million
- What is Virus Code Red? How to remove like?
- New variant of 'extremely toxic' virus appears
- Memory card makes more than 3000 phones infected with Viruses
- Signs that the smartphone has been infected with malware
Maybe you are interested
iPhone security tips you're missing out on
This list of common passwords shows how little we understand about online security
Download free Windows Server 2025 security guide
5 Misconceptions About Password Security
Should I buy a USB, Bluetooth or NFC security key?
4 Security Steps to Follow When Using Remote Access Applications