Over 80 Percent of Android Users Still at Risk of Being Infected by Dated Malware Ghost Push: Report

October 19, 2016

Oct 19: Apple has consistently taken digs at Google by comparing the adoption rate of the latest versions of both iOS and Android at its launch events. It seems the slow adoption rate is one of the key reasons why a large chunk of Android users are still not safe from dated malware.

AndroidGhost Push, the malware that had infected over 900,000 Android devices till last year, continues to wreak havoc on smartphones and tablets running Google's mobile operating system, according a new report by Chinese antivirus firm Cheetah Mobile. The study says that the malware is infecting 10,000 new devices a day even now, and over 50 percent of the affected devices are from India.

It has been more than a year since Cheetah Mobile first discovered the malware Ghost Push. In its latest report, the firm has claimed that smartphones running Lollipop and older Android versions are still vulnerable to the malware, which has evolved since over the past year.

The report says that the malware is not able to infect Android versions starting from Android 6.0 but can potentially infect devices on all versions up to Marshmallow. Ghost Push malware first obtains root access to the affected Android device and then installs more malicious apps.

As per Google's Android distribution data from September, only 18.7 percent of Android users are running Android 6.0 Marshmallow or above, which effectively means that 81.3 percent of the total Android users are at a potential risk of getting affected by this malware.

The malware not only displays ads and promotes apps and web pages but can also lead users to pornographic websites. It can also show advertisements in the Notification Bar. Ghost Push trojans are promoting as many as 30,000 to 40,000 apps on infected devices, including legitimate apps as well as malware.

As last year's report had noted, the malware had managed to find its way to inside of many Google Play apps. Now, the firm is saying that the installation of apps from unknown sources is one of the major reasons for the devices to get affected by this malware. Popular apps like MX Player Pro, ES File Manager Pro, Run Keeper, Firefox and Music Player Pro, if downloaded from unknown sources, can be potentially infected with Ghost Push.

It is highly advisable for all Android users to constantly update their devices with the latest software upgrades - if available - in order to ensure that they are protected against these kinds of threats.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 27,2020

Mumbai, Jun 27: The Bombay High Court observed that COVID-19 patients from poor and indigent sections cannot be expected to produce documentary proof to avail subsidised or free treatment while getting admitted to hospitals.

The court on Friday was hearing a plea filed by seven residents of a slum rehabilitation building in Bandra, who had been charged ₹ 12.5 lakh by K J Somaiya Hospital for COVID-19 treatment between April 11 and April 28.

The bench of Justices Ramesh Dhanuka and Madhav Jamdar directed the hospital to deposit ₹10 lakh in the court.

The petitioners had borrowed money and managed to pay ₹10 lakh out of ₹12.5 lakh that the hospital had demanded, after threatening to halt their discharge if they failed to clear the bill, counsel Vivek Shukla informed the court.

According to the plea, the petitioners were also overcharged for PPE kits and unused services.

On June 13, the court had directed the state charity commissioner to probe if the hospital had reserved 20% beds for poor and indigent patients and provided free or subsidised treatment to them.

Last week, the joint charity commissioner had informed the court that although the hospital had reserved such beds, it had treated only three poor or indigent persons since the lockdown.

It was unfathomable that the hospital that claimed to have reserved 90 beds for poor and indigent patients had treated only three such persons during the pandemic, advocate Shukla said.

He further argued that COVID-19 patients, who are in distress, cannot be expected to produce income certificate and such documents as proof.

However, senior advocate Janak Dwarkadas, who represented the hospital, said the petitioners did not belong to economically weak or indigent categories and had not produced documents to prove the same.

A person who is suffering from a disease like COVID-19 cannot be expected to produce certificates from a tehsildar or social welfare officer before seeking admission in the hospital, the bench noted and asked the hospital to deposit ₹10 lakh in court within two weeks.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 2,2020

Paris, Jul 2: Several interacting exoplanets have already been spotted by satellites. But a new breakthrough has been achieved with, for the first time, the detection directly from the ground of an extrasolar system of this type.

An international collaboration including CNRS researchers has discovered an unusual planetary system, dubbed WASP-148, using the French instrument SOPHIE at the Observatoire de Haute-Provence (CNRS/Aix-Marseille Universite).

The scientists analysed the star's motion and concluded that it hosted two planets, WASP-148b and WASP-148c. The observations showed that the two planets were strongly interacting, which was confirmed from other data.

Whereas the first planet, WASP-148b, orbits its star in nearly nine days, the second one, WASP-148c, takes four times longer. This ratio between the orbital periods implies that the WASP-148 system is close to resonance, meaning that there is enhanced gravitational interaction between the two planets. And it turns out that the astronomers did indeed detect variations in the orbital periods of the planets.

While a single planet, uninfluenced by a second one, would move with a constant period, WASP-148b and WASP-148c undergo acceleration and deceleration that provides evidence of their interaction.

The study will shortly be published in the journal Astronomy & Astrophysics.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 19,2020

Cybersecurity researchers on Monday warned of a Trojan malware campaign which is targeting India's co-operative banks using COVID-19 as a bait.

Seqrite, the enterprise arm of IT security firm Quick Heal Technologies, detected the new wave of Adwind Java Remote Access Trojan (RAT) campaign.

Researchers at Seqrite warned that if attackers are successful, they can take over the victim's device to steal sensitive data like SWIFT logins and customer details and move laterally to launch large scale cyberattacks and financial frauds.

According to the researchers, the Java RAT campaign starts with a spear-phishing email which claims to have originated from either the Reserve Bank of India or a nationalised bank.

The content of the email refers to COVID-19 guidelines or a financial transaction, with detailed information in an attachment, which is a zip file containing a JAR based malware.

Upon further investigation, researchers at Seqrite found that the JAR based malware is a Remote Access Trojan that can run on any machine which has Java runtime enabled and hence it can impact a variety of endpoints, irrespective of their base operating system.

Once the RAT is installed, the attacker can take over the victim's device, send commands from a remote machine, and spread laterally in the network.

In addition, this malware can also log keystrokes, capture screenshots, download additional payloads, and extract sensitive user information, Seqrite said, adding that such attack campaigns can effectively jeopardise the privacy and security of sensitive data at the co-operative banks and result in large scale attacks and financial frauds.

To prevent such attacks, users need to exercise ample caution and avoid opening attachments and clicking on web links in unsolicited emails.

Banks should also keep their operating systems updated and have a full-fledged security solution installed on all the devices, Seqrite advised.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.