According to the new discovery of security researchers, a Russian malicious code is targeting Android smartphone users. This dangerous malicious code can especially read text messages, listen to calls or record conversations through the voice mic on the device.
Lab52 computer security researchers have discovered new malicious code targeting the Android operating system. This is malicious code developed in Russia and the malicious code spreads on the web through seemingly harmless APK files.
The malicious code lurks in the code of an application called Process Manager. Once installed on the victim’s Android smartphone, the malicious code takes over the data on it. The virus will ask for a bunch of permissions on the user’s Android.
Specifically, the malicious code requests access to the phone’s location, GPS data, nearby networks, Wi-Fi information, text messages, phone calls, sound settings, and contact list of the phone. Friend. On top of that, the malware itself allows to activate the phone’s microphone or take pictures through the front and rear cameras without your knowledge. In short, your entire privacy is at risk.
A remote server in Russia will receive all the information. To prevent users from deleting applications, malicious code will make the Process Manager icon disappear from the home screen. Many spyware uses this guise to make victims believe that they have deleted the applications or are no longer paying attention to them. This is the case of the Ginp virus discovered in late 2019 on Android, also known as the extremely dangerous xHelper Trojan.
To avoid danger and unfortunately get caught in this malicious code, it is best for users to avoid placing APK files of unknown origin.
Refer to Gizchina