Sockbot malware was discovered in applications on Google Play Store
This month, Symantec discovered a new type of malware on Android called Sockbot, a legitimate application on Google Play that allows an attacker to create fake ad traffic.
Symantec researchers claim that at least eight applications contain Sockbot identified and have between 600,000 and 2.6 million downloads and installations. The purpose of these applications is to change the look of the characters in the Minecraft Pocket Edition game. Besides, it also creates illegal advertising revenue.
- Google's new Play Protect system failed from the first test
Malware Sockbot implements a SOCKS proxy mechanism on infected devices
The name Sockbot comes from the operating mode of this malware. They install and deploy SOCKS proxy mechanisms on devices that infect and wait for commands from a remote C&C server.
Symantec also noted that this Sockbot malware could easily be expanded, leveraging some network vulnerabilities and being able to bypass security boundaries. In other words, attackers can use Sockbot to perform next DDoS attacks.
This is not the first Android botnet discovered this year. At the end of last August, the alliance of security firms together removed the botnet WireX, which includes more than 120,000 Android devices infecting and executing DDoS attacks.
Fortunately, Symantec has informed Google of eight malware-infected applications on October 6 and the company quickly deleted them from the Google Play store. However, this also reminds us to always be cautious when downloading any application on the Google Play Store store.
You should read it
- Google 'purged' 24 applications downloaded nearly 500,000 times containing malicious malware
- These Android apps with more than 100,000 downloads contain Joker malware, please remove immediately
- Series of Android applications contain malicious code you should remove immediately from your device
- 5 types of malware on Android
- Detecting Android malware can easily steal OTP code without the victim knowing
- How does malware get into smartphones?
- Malware Judy attacked more than 36.5 million Android phones
- How to detect and remove malware Agent Smith on Android
May be interested
- Students are expelled for using keyloggers to correct scoresthe university of kansas fired a student by installing keylogger and hacking the school's score system to change its grades.
- The unpatched Microsoft Word DDE vulnerability is exploited in a massive malware attacka new attack method that exploits the microsoft office integration feature has been discovered being used for malware distribution campaigns.
- LokiBot - bank trojan on Android turns into ransomware when you try to delete itsecurity agents have discovered a new bank trojan on android called lokibot that turns into extortion code and locks the phone when the user tries to delete its admin rights.
- Bad Rabbit - Petya's new ransomware spreads throughout Eastern Europea new ransomware called bad rabbit is stirring up many countries in eastern europe, including government and business units. the spread rate is similar to wannacry and notpetya which took place in may and june.
- DUHK attacks allow hackers to obtain encryption keys for VPN and web browsing sessionsduhk - dont use hard-coded keys - is a new dangerous encryption executable vulnerability that allows an attacker to recover the encryption key used to secure vpn connections and web sessions.
- Roboto Font Condensed install malware on your computerthe message lacks a fake roboto condensed font that requires users to update and install it to put malware on your computer.