In July, the number of threats detected on Android devices decreased by 6.7% compared to June. The number of active malware lowered by 6.75%, unwanted applications by 4.6%, riskware by 8.42% and adware by 9.83%.
Throughout the month, Doctor Web malware analysts uncovered yet more malicious apps on Google Play. The Android.Banker.3259 banking trojan, disguised as an SMS manager, was one of them. New modifications of the Android.HiddenAds adware trojan family, capable of displaying advertisement banners, were among other threats. Furthermore, a new member of the dangerous Android.Joker trojan family, designed to subscribe users to premium services and execute arbitrary code, has also been spotted.
PRINCIPAL TRENDS IN JULY
The number of threats detected on Android mobile devices has decreased
The discovery of new threats on Google Play
According to statistics collected by Dr.Web for Android
Malicious applications that download and execute arbitrary code. Depending on their modification, they can load various websites, open web links, click on advertisement banners, subscribe users to premium services and perform other actions.
Software that monitors Android user activity and may serve as a tool for cyber espionage. These apps can track device locations, collect information from SMS and social media messages, copy documents, photo and video, spy on phone calls, etc.
Detection name for adware programs that imitate anti-virus software. These apps inform users of non-existing threats, mislead them and demand they purchase the full version of the software.
Detection name for programs designed to assign credit ratings to users based on their personal data. These applications upload SMS, contact information from phonebooks, call history and other information to the remote server.
A packer tool designed to protect Android applications from their unauthorised modification and reverse engineering. This tool is not malicious by itself, but it can be used to protect both harmless and malicious software.
Program modules incorporated into Android applications and designed to display obnoxious ads on Android devices. Depending on their family and modifications, they can display full screen ads and block other apps’ windows, show various notifications, create shortcuts and load websites.
Upon their launch, they hid their icons from the apps list on the main screen, similar to other trojans of this family. They do so to make it more difficult for the users to delete them. After that, they start to display obnoxious advertisement overlays on top of other apps and the operating system UI.
Another trojan discovered by Doctor Web malware analysts was dubbed Android.Joker.279. It hid under the guise of an application designed to work with SMS. Upon its launch, it subscribed victims for premium services and was able to run arbitrary code.
Moreover, our specialists uncovered a new banking trojan dubbed Android.Banker.3259. Malware writers based this banker on an open source SMS messenger.
Upon its launch, the trojan connects to the remote server and waits for further commands. Based on the received response, it either continues to operate as a harmless application or tries to steal personal data from the user by displaying a phishing window. In addition, Android.Banker.3259 saves all the incoming and outgoing SMS to the Firebase cloud database. Cybercriminals can then use the information, obtained from these messages, in future attacks.
To protect your Android device from malware and unwanted programs, we recommend installing Dr.Web for Android.
Your Android needs protection.
The first Russian anti-virus for Android
Over 140 million downloads—just from Google Play
Available free of charge for users of Dr.Web home products