The page may not load correctly.
March 4, 2015
January 2015 | February 2015 | Movement |
---|---|---|
6087 | 6665 | +9,5% |
At the beginning of February, a number of applications containing a new aggressive advertising module, Adware.MobiDash.1.origin, were detected in the Google Play digital content catalogue. Some of these programs were downloaded by users tens of millions of times. Adware.MobiDash.1.origin incorporates the following features:
In the past month Doctor Web security researchers registered the emergence of several new advertising modules with rather aggressive features. Adware.MobiDash.1.origin, which was incorporated in a number of applications on Google Play, became one of them.
Other "unpleasant" advertising modules:
The number of entries of Android.Locker in the Dr.Web virus database:
January 2015 | February 2015 | Movement |
---|---|---|
159 | 174 | +9,4% |
In February, a dangerous ransomware locker named Android.Locker.71.origin was discovered. The program encrypts files, locks the infected device, and demands a $200 ransom.
![]() |
![]() |
![]() |
Android.Locker.71.origin uses a unique encryption key to encrypt files on each infected device—this complicates restoring data compromised by the Trojan.
Currently, decryption of the files affected by the actions of this malware is not possible, however, all versions of Android.Locker.71.origin are successfully detected and removed by Dr.Web for Android and, thus, users are protected from this Trojan’s activities.
Last month there was a significant increase in the number of new SMS Trojans sending short messages at premium numbers and subscribing users to chargeable services. The number of enentries of Android.SmsSend in the Dr.Web virus database:
January 2015 | February 2015 | Movement |
---|---|---|
2870 | 3264 | +13,7% |
Once again, there was a splash in activity of various mobile banking Trojans in February. In particular, such malicious applications were spread in South Korea, where cybercriminals launched an SMS mailing again to distribute Trojan download links.
Over 80 spam campaigns involving several malicious programs were registered. Most of them were dropper Trojans.
Hides inside other Trojans, which in this case are banking Trojans—the main tools of South Korean criminals.
A malicious program that allows attackers to perform various actions on infected mobile devices.
The following banking Trojans were used by South Korean cybercriminals:
All these programs enable virus writers to gain access to users' bank accounts.