![]() "Despite public awareness of this particular malware, it keeps finding its way into Google's official application market by employing changes in its code, execution methods, or payload-retrieving techniques," the researchers stated. The company uses its internal Bouncer checks for apps submitted to the Play Store, along with on-device scanning using Google Play Protect. Joker Malware bypasses Google security: However, what is really worrying is that the malware repeatedly manages to get back onto the Play Store, despite Google’s protection. That means it uses links like TinyURL, bit.ly, Rebrand.ly, zws.im, 27url.cn and others in order to mask the real server names it downloads the malicious payload from. It downloads the malware “payload” using URL shorteners. Unlike the previous versions of the malware, the new Joker variants are using a novel method of infecting the device. The app also attempts to hide its tracks by using the ‘read notifications’ permission to hide any sign-up messages. How they lured users: The Joker malware is notorious for aggressive ‘billing’ by signing up users for premium services using SMS. Also read: Looking for a smartphone? Check Mobile Finder here.
0 Comments
Leave a Reply. |