I have never experienced the fear of malicious applications. I had several reasons. First, the likelihood that they will go to my smartphone, considering I don’t download junk from the Internet that are frankly low. Secondly, as a rule, they strike a fairly limited range of applications. Well, and thirdly, I understand roughly how to deal with them. Here are just hackers constantly improving their skills to create malicious software, and many do not even know how they can be addressed.
How to set SberPay on Android and how to pay
On Android there is a new virus program BlackRock, attacking a total of 337 applications. Her goal is to steal the credentials to access them. It’s not just banking apps, which tend to become victims of Trojan and phishing, and social networking clients, instant messengers and many other services. But if you understand the desire of cyber criminals to steal money from their victims, in principle, possible, that’s why they needed the account Instagram, Twitter and other services is unknown.
How to steal data on Android
As a rule, BlackRock gets on the device of their victims under the guise of Android updates via untrusted web resources. That is, it is for the most advanced users who are accustomed to look for the installation files updates the Internet without having much idea what form they exist. Attackers use their innocence and not even bother to embed malicious code in the update, spreading BlackRock in its purest form.
Google will ban beauty modes of cameras in Android 11
BlackRock leads the data collection a fairly standard way. Whenever a user launches a specific application, Trojan understands this and slips him a fake login window. As a result, the victim sees that she is invited to sign in again, enter their username and password, not knowing that in fact, these data are sent to the attackers, who corny seize control over the account and can perform actions on its behalf. For example, to write the users and ask to borrow money, as often happens today.
How to protect yourself from viruses on Android
But you have to understand that Black Rock is the Almighty app. That is, once the user’s device, it will not be able to begin to conduct subversive activities without special permits. For that he needs to get the privilege to access the overlay mechanism that allows users to block phishing Windows legitimate applications. Their BlackRock slips to his victims, offering to pass a false authorization and actually volunteered their data to fraudsters.
Survived! Called Android more securethan iOS
To protect against this type of programs is quite simple. First, it is necessary to abandon the idea of downloading updates and software from unofficial channels, waiting for all the updates over the air. Secondly, you need to give the application all permissions to the left-to-right, but still a little to peer at what they are requesting. Well, and thirdly, the overlap of the legitimate application of a phishing page is clearly visible in the menu multitasking. So if you suddenly see that the banking application asks for re-authorization, start multitasking and see if the number of running any weird programs.