• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Whitepapers
  • SMB Spotlight
  • Newsletters
  • Sign in
  • Events
    • Upcoming events
      event logo
      Big Data Virtual Summit

      The Big Data Virtual Summit will comprise expert keynotes, real world case studies and interactive discussion panels led by senior IT practitioners who will share their tips for Big Data technologies and data management strategies.

      • Date: 19 Oct 2016
      • Online
      View all events
      Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Whitepapers
    • V3-resources-120x194
      Leveraging data for small businesses

      The most successful businesses are those with confidence in their ability to store, access and use data effectively.  Rather than focusing on the nuts and bolts of storage, this view point looks at the data it holds and more importantly, what can be done with it.

      Download
      V3-resources-120x194
      Getting the SMB network just right

      This review looks at why small businesses need to stop being complacent about their networks and at what they can do to maintain their competitive edge as they follow the big boys down the route of increasing collaboration and other bandwidth-hungry applications likely to impact on network performance and availability.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • SMB Spotlight
  • Sign in
  •  
    •  

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      Forgot your password?
     
     
      • Saved articles
      • Newsletters
      • Apps
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
    • Apps
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    Forgot your password?
 
 
    • Saved articles
    • Newsletters
    • Apps
    • Account details
    • Contact support
    • Sign out
 
V3.co.uk
  • Security

Android Fakedefender malware attacks Google smartphone and tablet users

Malicious app found duping unaware Android users

Google Android Malware
  • Alastair Stevenson
  • Alastair Stevenson
  • @MonkeyGuru
  • 24 June 2013
  • Tweet  
  • Facebook  
  •  
  •  
  • Save this article  
  • Send to  
0 Comments

New ransomware masquerading as a legitimate Android security app has been uncovered by Symantec researchers.

Symantec's Joji Hamada said the malicious app infects users' machines by pretending to be a legitimate free antivirus app. However, unlike a legitimate security app, rather than protecting the user from malware, it loads it onto the device.

"The scam has evolved over time and we are now seeing FakeAV threats making their way onto Android devices. One interesting variant we have come across, detected by Symantec as Android.Fakedefender, locks up the device just like Ransomware," wrote Hamada.

"Once the malicious app has been installed, user experience varies as the app has compatibility issues with various devices. However, many users will not have the capability to uninstall the malicious app as the malware will attempt to prevent other apps from being launched. The threat will also change the settings of the operating system."

Hamada said the malware is particularly nasty as it can in some cases block the device's hard reset command. "In some cases users may not even be able to perform a factory data reset on the device and will be forced to do a hard reset, which involves performing specific key combinations and/or connecting the device to a computer in order to perform a reset using software provided by the manufacturer," he wrote.

"If they are lucky, some users may be able to perform a simple uninstall due to the fact that the app may crash when executed because of compatibility issues."

FakeDefender is one of many targeting the Android operating system. Hamada said the high success rate of the attacks will lead criminals to increase the number of threats using the tactic, calling for Android users to install legitimate, trusted mobile security applications.

"We may soon see FakeAV on the Android platform increase to become a serious issue just like it did on computers. These threats may be difficult to get rid of once installed, so the key to staying protected against them is preventing them from getting onto your device in the first place," he wrote.

The ransomware is one of many new mobile threats uncovered this year. Russian security firm Kaspersky reported detecting 23,000 new mobile threats in its Q1 2013 Threat Report.

  • Tweet  
  • Facebook  
  •  
  •  
  • Save this article  
  • Send to  
  • Topics
  • Security
  • Operating Systems
  • Symantec
  • Hacking
  • Smartphones
  • Android
  • cyber-crime

V3 Latest

Galaxy Note 7 render
Samsung Galaxy Note 7 release date, price, specs and features

Pre-orders point to a 2 September release, can be picked up for £699 SIM-free

  • Mobile Phones
  • 16 August 2016
Digital encryption key
EU considers imposing telecoms rules on web chat services

Changes could have big impact on encryption and privacy

  • Security
  • 16 August 2016
Microsoft Windows 10 on a laptop
Windows 10 Anniversary Update: 8 ways to tackle problems caused by latest release

Tips to get your PC back in order if the Anniversary Update has created problems

  • Operating Systems
  • 16 August 2016
Surface Book fulcrum hinge
Microsoft Surface Book 2 release date, specs and price rumours

Second-generation Surface to include hinge redesign

  • Laptops
  • 16 August 2016
blog comments powered by Disqus
Back to Top

Most read

IBM TrueNorth chip core array - Image IBM
IBM TrueNorth 'cognitive chip' can capture 2,000 fps with a camera
Sage at Accountex
Sage breach exposes personal data of staff at 280 companies
Microsoft Windows 10 on a laptop
Windows 10 Anniversary Update: 8 ways to tackle problems caused by latest release
Galaxy Note 7 render
Samsung Galaxy Note 7 release date, price, specs and features
Tim Cook and Aaron Levie in discussion at BoxWorks in San Francisco
Tim Cook's 5 key moments as Apple CEO: Maps, iPhones and Apple Watch launch
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About Incisive Media
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube
  • Apps

© Incisive Business Media Limited

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, are companies registered in England and Wales with company registration numbers 9177174 & 9178013

Digital publisher of the year 2010, 2013 & 2016

Digital publisher of the year 2010, 2013 & 2016